Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey

A Barua, MA Al Alamin, MS Hossain… - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …

Covid-19: Secure healthcare internet of things networks, current trends and challenges with future research directions

M Adil, J Ali, MM Jadoon, SR Alotaibi, N Kumar… - ACM Transactions on …, 2023 - dl.acm.org
The number of affirmed COVID-19 cases showed an enormous increase in the recent past
throughout the globe. Kee** in view the catastrophic destruction of this devastating virus …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

Evaluating physical-layer ble location tracking attacks on mobile devices

H Givehchian, N Bhaskar, ER Herrera… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
Mobile devices increasingly function as wireless tracking beacons. Using the Bluetooth Low
Energy (BLE) protocol, mobile devices such as smartphones and smartwatches …

Sok: The long journey of exploiting and defending the legacy of king harald bluetooth

J Wu, R Wu, D Xu, DJ Tian… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Named after the Viking King Harald Bluetooth, Bluetooth is the de facto standard for short-
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …

{BLESA}: Spoofing attacks against reconnections in bluetooth low energy

J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi… - 14th USENIX Workshop …, 2020 - usenix.org
The Bluetooth Low Energy (BLE) protocol ubiquitously enables energy-efficient wireless
communication among resource-constrained devices. To ease its adoption, BLE requires …

A survey on indoor positioning security and privacy

Y Sartayeva, HCB Chan - Computers & Security, 2023 - Elsevier
With rising demand for indoor location-based services (LBS) such as location-based
marketing, mobile navigation, etc., there has been considerable interest in indoor …

{LIGHTBLUE}: Automatic {Profile-Aware} debloating of bluetooth stacks

J Wu, R Wu, D Antonioli, M Payer… - 30th USENIX Security …, 2021 - usenix.org
The Bluetooth standard is ubiquitously supported by computers, smartphones, and IoT
devices. Due to its complexity, implementations require large codebases, which are prone to …

Practical obfuscation of BLE physical-layer fingerprints on mobile devices

H Givehchian, N Bhaskar, A Redding… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Mobile devices continuously beacon Bluetooth Low Energy (BLE) advertisement packets.
This has created the threat of attackers identifying and tracking a device by sniffing its BLE …

Blueswat: A lightweight state-aware security framework for bluetooth low energy

X Che, Y He, X Feng, K Sun, K Xu, Q Li - … of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Bluetooth Low Energy (BLE) is a short-range wireless communication technology for
resource-constrained IoT devices. Unfortunately, BLE is vulnerable to session-based …