Skip to Main content Skip to Navigation
Conference papers

Securing bluetooth low energy locks from unauthorizedaccess and surveillance

Abstract : This chapter describes several vulnerabilities that affect commercial and residential Bluetooth Low Energy security devices and outlines methods for exploiting plaintext, obfuscated and hard-coded passwords, brute forcing passwords and hashes, fuzzing commands and performing man-in-the-middle attacks. Evaluations reveal that 75% of the tested security and access control systems have vulnerabilities that grant unauthorized access. In addition to obtaining access, malicious actors can extract sensitive information that can be used to develop patterns of human behavior. This chapter discusses five solutions for preventing or mitigating Bluetooth Low Energy security breaches, most of which involve minimal implementation overhead on the part of developers.
Document type :
Conference papers
Complete list of metadata

Cited literature [25 references]  Display  Hide  Download

https://hal.inria.fr/hal-01819142
Contributor : Hal Ifip <>
Submitted on : Wednesday, June 20, 2018 - 9:24:08 AM
Last modification on : Wednesday, June 20, 2018 - 9:34:07 AM
Long-term archiving on: : Monday, September 24, 2018 - 7:54:07 PM

File

460140_1_En_16_Chapter.pdf
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Anthony Rose, Jason Bindewald, Benjamin Ramsey, Mason Rice, Barry Mullins. Securing bluetooth low energy locks from unauthorizedaccess and surveillance. 11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.319-338, ⟨10.1007/978-3-319-70395-4_16⟩. ⟨hal-01819142⟩

Share

Metrics

Record views

241

Files downloads

276