Security threats in Bluetooth technology

SS Hassan, SD Bibon, MS Hossain… - Computers & Security, 2018 - Elsevier
Bluetooth allows connecting mobile devices in short range in order to transfer files/videos. It
is now a popular means of short range wireless communication. Although Bluetooth is …

[HTML][HTML] A test environment for wireless hacking in domestic IoT scenarios

A Muñoz, C Fernández-Gago, R López-Villa - Mobile Networks and …, 2022 - Springer
Security is gaining importance in the daily life of every citizen. The advent of Internet of
Things devices in our lives is changing our conception of being connected through a single …

[PDF][PDF] Bluetooth MITM vulnerabilities: a literature review, novel attack scenarios, novel countermeasures, and lessons learned

MA Albahar, K Haataja, P Toivanen - International Journal on …, 2016 - researchgate.net
Bluetooth security has been a growing concern among users and manufacturers of a wide
variety of mobile devices and gadgets. This is because these devices have come to require …

[PDF][PDF] SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth

J Wu, R Wu, D Xu, D Tian… - 2024 IEEE Symposium on …, 2023 - wuruoyu.github.io
Bluetooth is the de facto standard for short-range wireless communications. The introduction
of Bluetooth Low Energy (BLE) and Mesh protocols has further paved the way for its …

Contention for man-in-the-middle attacks in Bluetooth networks

S Sandhya, KAS Devi - 2012 Fourth International Conference …, 2012 - ieeexplore.ieee.org
The adoption rate of Bluetooth technology has been very fast. It is estimated that there will
be around 1 billion users who will be using some Bluetooth devices one way or the other …

BLESS: A BLE application security scanning framework

Y Zhang, J Weng, Z Ling, B Pearson… - IEEE INFOCOM 2020 …, 2020 - ieeexplore.ieee.org
Bluetooth Low Energy (BLE) is a widely adopted wireless communication technology in the
Internet of Things (IoT). BLE offers secure communication through a set of pairing strategies …

Secure key exchange using enhanced Diffie-Hellman protocol based on string comparison

A Taparia, SK Panigrahy… - … International conference on …, 2017 - ieeexplore.ieee.org
Authenticated key exchange protocols play an important role in securing communications
and are extensively deployed for use in various real-world network applications. Diffie …

Bluetooth low energy devices security testing framework

A Ray, V Raj, M Oriol, A Monot… - 2018 IEEE 11th …, 2018 - ieeexplore.ieee.org
Bluetooth Low Energy (BLE), a low-power wireless protocol, is widely used in industrial
automation for monitoring field devices. Although the BLE standard defines advanced …

VibeRing using vibrations from a smart ring as an out-of-band channel for sharing secret keys

S Sen, D Kotz - Proceedings of the 10th International Conference on …, 2020 - dl.acm.org
Some Internet of Things (IoT) devices-aka" smart Things"-collect meaningful information
when they are in use and in physical contact with their user (eg, a blood-pressure monitor) …

TOWARDS ENHANCING JUST WORKS MODEL IN BLUETOOTH PAIRING.

MA Albahar, K Haataja… - International Journal on …, 2016 - search.ebscohost.com
Bluetooth technology offers great opportunities for a variety of applications and has good
market prospects. However, numerous publications and test results give rise to some …