Security Vulnerabilities in Bluetooth Technology as Used in IoT

被引:79
作者
Lonzetta, Angela M. [1 ]
Cope, Peter [2 ]
Campbell, Joseph [2 ]
Mohd, Bassam J. [3 ]
Hayajneh, Thaier [1 ]
机构
[1] Fordham Univ, Fordham Ctr Cybersecur, New York, NY 10023 USA
[2] New York Inst Technol, Comp Sci Dept, Old Westbury, NY 11568 USA
[3] Hashemite Univ, Comp Engn Dept, Zarqa 13133, Jordan
关键词
Bluetooth; Bluetooth hacking; Bluetooth attacks; Bluetooth countermeasures; Bluetooth security; IoT; BlueBugging; BlueJacking; BlueBorne; Bluetooth vulnerabilities;
D O I
10.3390/jsan7030028
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low-cost solution for short-range radio transmissions. Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant technology for connecting IoT (Internet of Things). It can be found in cell phones, headsets, speakers, printers, keyboards, automobiles, children's toys, and medical devices, as well as many other devices. The technology can also be found in automated smart homes, to provide monitors and controls for lights, thermostats, door locks, appliances, security systems, and cameras. Bluetooth offers convenience and ease of use, but it lacks a centralized security infrastructure. As a result, it has serious security vulnerabilities, and the need for awareness of the security risks are increasing as the technology becomes more widespread. This paper presents an overview of Bluetooth technology in IoT including its security, vulnerabilities, threats, and risk mitigation solutions, as well as real-life examples of exploits. Our study highlights the importance of understanding attack risks and mitigation techniques involved with using Bluetooth technology on our devices. Real-life examples of recent Bluetooth exploits are presented. Several recommended security measures are discussed to secure Bluetooth communication.
引用
收藏
页数:26
相关论文
共 46 条
[1]  
Ahmed M., BLUETOOTH SECURITY
[2]  
[Anonymous], 2008, SPECIAL PUBLICATION
[3]  
Becker A., 2007, BLUETOOTH SECURITY H
[4]   An overview of the Bluetooth wireless technology [J].
Bisdikian, C .
IEEE COMMUNICATIONS MAGAZINE, 2001, 39 (12) :86-94
[5]   Studying Bluetooth malware propagation - The BlueBag project [J].
Carettoni, Luca ;
Merloni, Claudio ;
Zanero, Stefano .
IEEE SECURITY & PRIVACY, 2007, 5 (02) :17-25
[6]  
Chatterjee A., 2017, INT J MOD COMPUT SCI, V5, P3
[7]  
Cope P., 2017, P 7 IEEE ANN COMP CO
[8]   Bluetooth Low Energy Mesh Networks: A Survey [J].
Darroudi, Seyed Mahdi ;
Gomez, Carles .
SENSORS, 2017, 17 (07)
[9]  
Dibrov Y., IOT DEVICES COMPROMI
[10]  
Dunning J.P., BLUETOOTH THREAT TAX