Men-in-the-middle attack simulation on low energy wireless devices using software define radio

M TajDini, V Sokolov, V Buriachok - arXiv preprint arXiv:1906.10878, 2019 - arxiv.org
arXiv preprint arXiv:1906.10878, 2019arxiv.org
The article presents a method of organizing men-in-the-middle attack and penetration test
on Bluetooth Low Energy devices and ZigBee packets using software define radio with
sniffing and spoofing packets, capture and analysis techniques on wireless waves with the
focus on Bluetooth. The paper contains the analysis of the latest scientific work in this area,
provides a comparative analysis of SDRs and the rationale for the choice of hardware, gives
the sequence of actions for collecting wireless data packets and data collection from ZigBee …
The article presents a method of organizing men-in-the-middle attack and penetration test on Bluetooth Low Energy devices and ZigBee packets using software define radio with sniffing and spoofing packets, capture and analysis techniques on wireless waves with the focus on Bluetooth. The paper contains the analysis of the latest scientific work in this area, provides a comparative analysis of SDRs and the rationale for the choice of hardware, gives the sequence of actions for collecting wireless data packets and data collection from ZigBee and BLE devices, and analyzes ways to improve captured wireless packet analysis techniques. For the study collected experimental setup, the results of which are analyzed in real time. The collected wireless data packets are compared with those sent. The result of the experiment shows the weaknesses of local wireless networks.
arxiv.org
以上显示的是最相近的搜索结果。 查看全部搜索结果