Analyzing the Security of Bluetooth Low Energy

Published in The 18th International Conference on Electronics, Information, and Communication (ICEIC 2019), Jan 22-25 2019, Auckland, New Zealand, 2019

Recommended citation: Seth Sevier, Ali Tekeoglu, "Analyzing the Security of Bluetooth Low Energy", The 18th International Conference on Electronics, Information, and Communication (ICEIC 2019), Jan 22-25 2019, Auckland, New Zealand.

Abstract: Internet of Things devices have spread to near ubiquity this decade. All around us now lies an invisible mesh of communication from devices embedded in seemingly everything. Inevitably some of that communication flying around our heads will contain data that must be protected or otherwise shielded from tampering. The responsibility to protect this sensitive information from malicious actors as it travels through the air then falls upon the standards used to communicate this data. Bluetooth Low Energy (BLE) is one of these standards, the aim of this paper is to put its security standards to test. By attempting to exploit its vulnerabilities we can see how secure this standard really is. In this paper, we present steps for analyzing the security of BLE devices using open-source hardware and software.