BLE Protocol in IoT Devices and Smart Wearable Devices: Security and Privacy Threats

01/10/2023
by   Tushar Nagrare, et al.
0

Bluetooth Low Energy (BLE) has become the primary transmission media due to its extremely low energy consumption, good network scope, and data transfer speed for the Internet of Things (IoT) and smart wearable devices. With the exponential boom of the Internet of Things (IoT) and the Bluetooth Low Energy (BLE) connection protocol, a requirement to discover defensive techniques to protect it with practical security analysis. Unfortunately, IoT-BLE is at risk of spoofing assaults where an attacker can pose as a gadget and provide its users a harmful information. Furthermore, due to the simplified strategy of this protocol, there were many security and privacy vulnerabilities. Justifying this quantitative security analysis with STRIDE Methodology change to create a framework to deal with protection issues for the IoT-BLE sensors. Therefore, providing probable attack scenarios for various exposures in this analysis, and offer mitigating strategies. In light of this authors performed STRIDE threat modeling to understand the attack surface for smart wearable devices supporting BLE. The study evaluates different exploitation scenarios Denial of Service (DoS), Elevation of privilege, Information disclosure, spoofing, Tampering, and repudiation on MI Band, One plus Band, Boat Storm smartwatch, and Fire Bolt Invincible.

READ FULL TEXT

page 3

page 5

page 6

page 7

research
03/13/2019

Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey

With an enormous range of applications, Internet of Things (IoT) has mag...
research
01/18/2019

Smart-Lock Security Re-engineered using Cryptography and Steganography

After the rise of E-commerce, social media and messenger bots, rapid dev...
research
12/06/2018

Trustworthy Smart Band: Security Requirement Analysis with Threat Modeling

As smart bands make life more convenient and provide a positive lifestyl...
research
04/22/2020

Digit Recognition From Wrist Movements and Security Concerns with Smart Wrist Wearable IOT Devices

In this paper, we investigate a potential security vulnerability associa...
research
07/06/2020

Smart Home, security concerns of IoT

The IoT (Internet of Things) has become widely popular in the domestic e...
research
02/11/2020

Ask the Experts: What Should Be on an IoT Privacy and Security Label?

Information about the privacy and security of Internet of Things (IoT) d...
research
03/30/2020

Increasing negotiation performance at the edge of the network

Automated negotiation has been used in a variety of distributed settings...

Please sign up or login with your details

Forgot password? Click here to reset