Next Article in Journal / Special Issue
Co-Designing the Kits of IoT Devices for Inquiry-Based Learning in STEM
Previous Article in Journal
An Energy Efficient Modulation Scheme for Body-Centric Terahertz (THz) Nanonetworks
Open AccessArticle

A Comprehensive Review of RFID and Bluetooth Security: Practical Analysis

Department of Electrical and Electronic Engineering, University of Navarra, 20018 Donostia-San Sebastián, Spain
Data Analytics and Information Management (DAIM) Group, Centro de Estudios e Investigaciones Técnicas de Gipuzkoa (CEIT-IK4), 20009 Donostia-San Sebastián, Spain
Authors to whom correspondence should be addressed.
Technologies 2019, 7(1), 15;
Received: 6 December 2018 / Revised: 19 January 2019 / Accepted: 21 January 2019 / Published: 24 January 2019
(This article belongs to the Special Issue Technology Advances on IoT Learning and Teaching)
PDF [10715 KB, uploaded 30 January 2019]
  |     |  


The Internet of Things (IoT) provides the ability to digitize physical objects into virtual data, thanks to the integration of hardware (e.g., sensors, actuators) and network communications for collecting and exchanging data. In this digitization process, however, security challenges need to be taken into account in order to prevent information availability, integrity, and confidentiality from being compromised. In this paper, security challenges of two broadly used technologies, RFID (Radio Frequency Identification) and Bluetooth, are analyzed. First, a review of the main vulnerabilities, security risk, and threats affecting both technologies are carried out. Then, open hardware and open source tools like: Proxmark3 and Ubertooth as well as BtleJuice and Bleah are used as part of the practical analysis. Lastly, risk mitigation and counter measures are proposed. View Full-Text
Keywords: IoT; RFID; NFC; Bluetooth; Proxmark3; Ubertooth; BtleJuice; Bleah IoT; RFID; NFC; Bluetooth; Proxmark3; Ubertooth; BtleJuice; Bleah

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Figueroa Lorenzo, S.; Añorga Benito, J.; García Cardarelli, P.; Alberdi Garaia, J.; Arrizabalaga Juaristi, S. A Comprehensive Review of RFID and Bluetooth Security: Practical Analysis. Technologies 2019, 7, 15.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Technologies EISSN 2227-7080 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top