Next Article in Journal
Trajectory-Assisted Municipal Agent Mobility: A Sensor-Driven Smart Waste Management System
Previous Article in Journal
Priority-Based Machine-To-Machine Overlay Network over LTE for a Smart City
Article Menu

Export Article

Open AccessReview
J. Sens. Actuator Netw. 2018, 7(3), 28; https://doi.org/10.3390/jsan7030028

Security Vulnerabilities in Bluetooth Technology as Used in IoT

1
Fordham Center for Cybersecurity, Fordham University, New York, NY 10023, USA
2
Computer Science Department, New York Institute of Technology, Old Westbury, NY 11568, USA
3
Computer Engineering Department, Hashemite University, Zarqa 13133, Jordan
*
Author to whom correspondence should be addressed.
Received: 24 April 2018 / Revised: 15 June 2018 / Accepted: 12 July 2018 / Published: 19 July 2018
(This article belongs to the Special Issue Sensors and Actuators: Security Threats and Countermeasures)
Full-Text   |   PDF [3666 KB, uploaded 19 July 2018]   |  

Abstract

Bluetooth technology is a key component of wireless communications. It provides a low-energy and low-cost solution for short-range radio transmissions. Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant technology for connecting IoT (Internet of Things). It can be found in cell phones, headsets, speakers, printers, keyboards, automobiles, children’s toys, and medical devices, as well as many other devices. The technology can also be found in automated smart homes, to provide monitors and controls for lights, thermostats, door locks, appliances, security systems, and cameras. Bluetooth offers convenience and ease of use, but it lacks a centralized security infrastructure. As a result, it has serious security vulnerabilities, and the need for awareness of the security risks are increasing as the technology becomes more widespread. This paper presents an overview of Bluetooth technology in IoT including its security, vulnerabilities, threats, and risk mitigation solutions, as well as real-life examples of exploits. Our study highlights the importance of understanding attack risks and mitigation techniques involved with using Bluetooth technology on our devices. Real-life examples of recent Bluetooth exploits are presented. Several recommended security measures are discussed to secure Bluetooth communication. View Full-Text
Keywords: Bluetooth; Bluetooth hacking; Bluetooth attacks; Bluetooth countermeasures; Bluetooth security; IoT; BlueBugging; BlueJacking; BlueBorne; Bluetooth vulnerabilities Bluetooth; Bluetooth hacking; Bluetooth attacks; Bluetooth countermeasures; Bluetooth security; IoT; BlueBugging; BlueJacking; BlueBorne; Bluetooth vulnerabilities
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Lonzetta, A.M.; Cope, P.; Campbell, J.; Mohd, B.J.; Hayajneh, T. Security Vulnerabilities in Bluetooth Technology as Used in IoT. J. Sens. Actuator Netw. 2018, 7, 28.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
J. Sens. Actuator Netw. EISSN 2224-2708 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top