首页> 外文会议>International Conference on Advanced Computing and Communication Systems >An Overview of Practical Attacks on BLE Based IOT Devices and Their Security
【24h】

An Overview of Practical Attacks on BLE Based IOT Devices and Their Security

机译:基于BLE的物联网设备的实际攻击及其安全性概述

获取原文

摘要

BLE is used to transmit and receive data between sensors and devices. Most of the IOT devices employ BLE for wireless communication because it suits their requirements such as less energy constraints. The major security vulnerabilities in BLE protocol can be used by attacker to perform MITM attacks and hence violating confidentiality and integrity of data. Although BLE 4.2 prevents most of the attacks by employing elliptic-curve diffie-Hellman to generate LTK and encrypt the data, still there are many devices in the market that are using BLE 4.0, 4.1 which are vulnerable to attacks. This paper shows the simple demonstration of possible attacks on BLE devices that use various existing tools to perform spoofing, MITM and firmware attacks. We also discussed the security, privacy and its importance in BLE devices.
机译:BLE用于在传感器和设备之间发送和接收数据。大多数物联网设备将BLE用于无线通信,因为它适合其要求,例如较少的能量约束。攻击者可以使用BLE协议中的主要安全漏洞进行MITM攻击,从而破坏了数据的机密性和完整性。尽管BLE 4.2通过使用椭圆曲线diffie-Hellman生成LTK并加密数据来阻止大多数攻击,但市场上仍有许多使用BLE 4.0、4.1的设备容易受到攻击。本文简单演示了对BLE设备的可能攻击,该设备使用各种现有工具执行了欺骗,MITM和固件攻击。我们还讨论了安全性,私密性及其在BLE设备中的重要性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号