Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey

被引:39
|
作者
Barua, Arup [1 ]
Al Alamin, Md Abdullah [1 ]
Hossain, Md Shohrab [1 ]
Hossain, Ekram [2 ]
机构
[1] Bangladesh Univ Engn & Technol, Dept Comp Sci & Engn, Dhaka 89120, Bangladesh
[2] Univ Manitoba, Dept Elect & Comp Engn, Winnipeg, MB R3T 2N2, Canada
关键词
Security; Bluetooth; Internet of Things; Privacy; Protocols; Wearable computers; Taxonomy; Bluetooth Low Energy (BLE); BLE vulnerabilities; passive eavesdropping; device fingerprinting; privacy attack; IoT; wearable device; security tools; THINGS IOT; INTERNET; BLE; NETWORKS; CHALLENGES; MANAGEMENT; DESIGN; ATTACK;
D O I
10.1109/OJCOMS.2022.3149732
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption, ease of development, good enough network coverage, and data transfer speed. Due to the simplified design of this protocol, there have been lots of security and privacy vulnerabilities. As billions of health care, personal fitness wearable, smart lock, industrial automation devices adopt this technology for communication, its vulnerabilities should be dealt with high priority. Some segregated works on BLE were performed focusing on various vulnerabilities, such as the insecure implementation of encryption, device authentication, user privacy, etc. However, there has been no comprehensive survey on the security vulnerabilities of this protocol. In this survey paper, we present a comprehensive taxonomy for the security and privacy issues of BLE. We present possible attack scenarios for different types of vulnerabilities, classify them according to their severity, and list possible mitigation techniques. We also provide case studies regarding how different vulnerabilities can be exploited in real BLE devices.
引用
收藏
页码:251 / 281
页数:31
相关论文
共 50 条
  • [21] Exploring QUIC Security and Privacy: A Comprehensive Survey on QUIC Security and Privacy Vulnerabilities, Threats, Attacks, and Future Research Directions
    Joarder, Y.A.
    Fung, Carol
    IEEE Transactions on Network and Service Management, 2024, 21 (06): : 6953 - 6973
  • [22] A Survey of Privacy Concerns in Wearable Devices
    Datta, Prerit
    Namin, Akbar Siami
    Chatterjee, Moitrayee
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 4549 - 4553
  • [23] The Security and Privacy Protection Framework for Wearable Devices
    Cui, Youxiang
    Gu, Zhongwei
    Sun, Lei
    Tang, Haibo
    Cui, Lumeng
    DESIGN, OPERATION AND EVALUATION OF MOBILE COMMUNICATIONS, MOBILE 2022, 2022, 13337 : 203 - 210
  • [24] Privacy and Security in Internet of Things and Wearable Devices
    Arias, Orlando
    Wurm, Jacob
    Khoa Hoang
    Jin, Yier
    IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2015, 1 (02): : 99 - 109
  • [25] Secure protocol buffers for Bluetooth Low-Energy communication with wearable devices
    Francisco, Miguel C.
    Eisa, Samih
    Pardal, Miguel L.
    2021 IEEE 20TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2021,
  • [26] Data Privacy in Wearable IoT Devices: Anonymization and Deanonymization
    Park, Semi
    Kim, Riha
    Yoon, Hyunsik
    Lee, Kyungho
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [27] Address Privacy of Bluetooth Low Energy
    Sun, Dazhi
    Tian, Yangguang
    MATHEMATICS, 2022, 10 (22)
  • [28] A Testbed for Security and Privacy Analysis of IoT Devices
    Tekeoglu, Ali
    Tosun, Ali Saman
    PROCEEDINGS 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS 2016), 2016, : 343 - 348
  • [29] Are ConsumersWilling to Pay for Security and Privacy of IoT Devices?
    Emami-Naeini, Pardis
    Dheenadhayalan, Janarth
    Agarwal, Yuvraj
    Cranor, Lorrie Faith
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 1505 - 1522
  • [30] System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats
    Choi, Seul-Ki
    Yang, Chung-Huang
    Kwak, Jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 906 - 918