Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey thumbnail
Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey
ieeexplore.ieee.org
The replay attack is particularly dangerous because the attacker can easily sniff the communication of BLE central and peripheral devices It has a simplified protocol stack, which is to blame for many of its security and privacy flaws All of these personal and industrial devices simplify our lives a
1 Users
0 Comments
77 Highlights
0 Notes

Top Highlights

  • The replay attack is particularly dangerous because the attacker can easily sniff the communication of BLE central and peripheral devices
  • It has a simplified protocol stack, which is to blame for many of its security and privacy flaws
  • All of these personal and industrial devices simplify our lives and increase our productivity, but they also expand the attack surface of these systems
  • BLE is widely used in health care applications, its security and privacy risks could be fatal
  • insecure pairing, inappropriate authentication, and poor protocol implementation (e.g., lack of suitable cryptography) expose BLE devices to eavesdropping, pin cracking, Man-In-The-Middle (MITM), and other attacks

Ready to highlight and find good content?

Glasp is a social web highlighter that people can highlight and organize quotes and thoughts from the web, and access other like-minded people’s learning.