Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio

06/26/2019
by   Mahyar TajDini, et al.
0

The article presents a method of organizing men-in-the-middle attack and penetration test on Bluetooth Low Energy devices and ZigBee packets using software define radio with sniffing and spoofing packets, capture and analysis techniques on wireless waves with the focus on Bluetooth. The paper contains the analysis of the latest scientific work in this area, provides a comparative analysis of SDRs and the rationale for the choice of hardware, gives the sequence of actions for collecting wireless data packets and data collection from ZigBee and BLE devices, and analyzes ways to improve captured wireless packet analysis techniques. For the study collected experimental setup, the results of which are analyzed in real time. The collected wireless data packets are compared with those sent. The result of the experiment shows the weaknesses of local wireless networks.

READ FULL TEXT
research
05/17/2018

Test for penetration in Wi-Fi network: attacks on WPA2-PSK and WPA2-Enterprise

In this work the wireless networks security algorithms were analyzed. Th...
research
01/01/2021

Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey

Wireless networks are a key component of the telecommunications infrastr...
research
07/30/2022

L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing

Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) is a wireless technolog...
research
02/22/2019

Penetration Tests for Bluetooth Low Energy and Zigbee using the Software-Defined Radio

This article discusses the available Software Defined Radios (SDRs), com...
research
02/24/2018

BLEBeacon: A Real-Subject Trial Dataset from Mobile Bluetooth Low Energy Beacons

The BLEBeacon dataset is a collection of Bluetooth Low Energy (BLE) adve...
research
03/15/2019

AccFlow: Defending Against the Low-Rate TCP DoS Attack in Wireless Sensor Networks

Because of the open nature of the Wireless Sensor Networks (WSN), the De...
research
12/13/2018

Network Coding with Random Packet-Index Assignment for Data Collection Networks

This paper considers a data collection network consisting of uncoordinat...

Please sign up or login with your details

Forgot password? Click here to reset