An active man-in-the-middle attack on bluetooth smart devices
暂无分享,去创建一个
In the last years, the Internet of Things (IoT) has become integral part of our lives and its influence is expected to exponentially increase in the next years. For several reasons, however, the development of IoT has not gone hand in hand with an adequate reinforcement and consolidation of our security and privacy, despite the serious impact that IoT vulnerabilities may have on our digital and physical security. Bluetooth Low Energy (BLE), also known as Bluetooth Smart, is the most popular protocol for interfacing smart devices, wearables, and medical equipment. This contribution surveys the key security issues in the BLE protocol and discusses a possible architecture for BLE Man-in-the-Middle (MitM) attacks together with the related necessary equipment. In addition, after introducing some of the available tools for hacking BLE, a case-study based on their use was presented, which describes a MitM attack between a Bluetooth smart device and its designated mobile app. The case-study well exemplifies how easily, given the required proximity to the target, a possible hacker can control the data and, in some instances, even the mobile device itself, when connecting it to a BLE device.
[1] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[2] Alexey Melnikov,et al. The WebSocket Protocol , 2011, RFC.
[3] Nilima A. Dudhane,et al. Location Based and Contextual Services Using Bluetooth Beacons: New Way to Enhance Customer Experience , 2015 .
[4] Paul Syverson,et al. A Taxonomy of Replay Attacks , 1994 .
[5] Mike Ryan,et al. Bluetooth: With Low Energy Comes Low Security , 2013, WOOT.