Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey

A Barua, MA Al Alamin, MS Hossain… - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …

Securing Bluetooth Low Energy networking: An overview of security procedures and threats

A Lacava, V Zottola, A Bonaldo, F Cuomo, S Basagni - Computer Networks, 2022 - Elsevier
Abstract Bluetooth Low Energy (BLE) is rapidly becoming the de-facto standard for short-
range wireless communications among resource-constrained wireless devices. Securing …

A knowledge transfer-based semi-supervised federated learning for IoT malware detection

X Pei, X Deng, S Tian, L Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
As the demand for Internet of Things (IoT) technologies continues to grow, IoT devices have
been viable targets for malware infections. Although deep learning-based malware …

[HTML][HTML] A survey on Bluetooth Low Energy security and privacy

M Cäsar, T Pawelke, J Steffan, G Terhorst - Computer Networks, 2022 - Elsevier
Since its introduction in 2009, Bluetooth Low Energy (BLE) has become a remarkable
success. Due to its unique properties of low power requirements and its ubiquitous …

[PDF][PDF] SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth

J Wu, R Wu, D Xu, D Tian… - 2024 IEEE Symposium on …, 2023 - oaklandsok.github.io
Bluetooth is the de facto standard for short-range wireless communications. The introduction
of Bluetooth Low Energy (BLE) and Mesh protocols has further paved the way for its …

Automatic fingerprinting of vulnerable ble iot devices with static uuids from mobile apps

C Zuo, H Wen, Z Lin, Y Zhang - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
Being an easy-to-deploy and cost-effective low power wireless solution, Bluetooth Low
Energy (BLE) has been widely used by Internet-of-Things (IoT) devices. In a typical IoT …

Breaking secure pairing of bluetooth low energy using downgrade attacks

Y Zhang, J Weng, R Dey, Y Jin, Z Lin, X Fu - 29th USENIX Security …, 2020 - usenix.org
To defeat security threats such as man-in-the-middle (MITM) attacks, Bluetooth Low Energy
(BLE) 4.2 and 5. x introduced a Secure Connections Only (SCO) mode, under which a BLE …

Formal model-driven discovery of bluetooth protocol design vulnerabilities

J Wu, R Wu, D Xu, DJ Tian… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The Bluetooth protocol suite, including Bluetooth Classic, Bluetooth Low Energy, and
Bluetooth Mesh, has become the de facto standard for short-range wireless …

On the accuracy of measured proximity of bluetooth-based contact tracing apps

Q Zhao, H Wen, Z Lin, D Xuan, N Shroff - … , DC, USA, October 21-23, 2020 …, 2020 - Springer
A large number of Bluetooth-based mobile apps have been developed recently to help
tracing close contacts of contagious COVID-19 individuals. These apps make decisions …

{BLESA}: Spoofing attacks against reconnections in bluetooth low energy

J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi… - 14th USENIX Workshop …, 2020 - usenix.org
The Bluetooth Low Energy (BLE) protocol ubiquitously enables energy-efficient wireless
communication among resource-constrained devices. To ease its adoption, BLE requires …