Connection Dumping Vulnerability Affecting Bluetooth Availability

@inproceedings{Lounis2018ConnectionDV,
  title={Connection Dumping Vulnerability Affecting Bluetooth Availability},
  author={Karim Lounis and Mohammad Zulkernine},
  booktitle={CRiSIS},
  year={2018}
}
Over the last few years, Bluetooth technology has been deployed in millions of devices including laptops, watches, mobile phones, cars, printer, and many other devices. It has been rapidly adopted as a short-range wireless communication technology for different IoT applications such as smart cities, smart healthcare, and smart grids. Yet, little attention has been paid to Bluetooth security. In this paper, we report a new Bluetooth vulnerability, named connection dumping. We show that this… 
Bluetooth Low Energy Makes “Just Works” Not Work
TLDR
This paper discusses how Bluetooth devices that use the Just Works pairing mode can be exploited to become nonoperational, and presents a vulnerability that is due to the behavior of BLE smart devices and the Just works pairing mode.
Attacks and Defenses in Short-Range Wireless Technologies for IoT
TLDR
This paper provides a survey of attacks related to the wireless infrastructures of IoT, and to the most used short-range wireless communication technologies in the resource-constrained part of IoT in particular, and provides a taxonomy of these attacks based on a security service-based attack classification.

References

SHOWING 1-7 OF 7 REFERENCES
Bluetooth for Java
TLDR
In the book, Bruce Hopkins and Ranjith Antony describe how to develop wireless Java applications using Bluetooth for a variety of platforms, including an API overview of the Java library, development of Bluetooth-based services, highlights of security concerns, and walkthroughs for development with some of the different tools available.
Security Weaknesses in Bluetooth
TLDR
A range of methods can be employed to strengthen the protocol and prevent the newly discovered attacks, including a location attack, which can be used for industrial espionage, blackmail, and other undesirable activities.
Bluetooth Application Programming with the Java APIs Essentials Edition
TLDR
The latest updates to the JABWT standard, defined by the JSR-82 Java Specification Request, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable.
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
TLDR
It is demonstrated that the passkey entry association model in SSP is vulnerable to the MITM attack, once the host reuses the passkeys, and an improved passkeyentry protocol is designed to fix the reusing passkey defect in the pass Keyed Entry Association model.
BlueSniff: Eve Meets Alice and Bluetooth
TLDR
This work results in the first open-source Bluetooth sniffer, showing how the full MAC address of master devices can be obtained, therefore bypassing the access control of this feature.
Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode
TLDR
The practicality of the Passkey Entry method, which uses a PIN entered on one or both devices to authenticate the key agreement, is explored and it is shown that it is should be taken very seriously.