A Comprehensive Review of RFID and Bluetooth Security: Practical Analysis
AbstractThe Internet of Things (IoT) provides the ability to digitize physical objects into virtual data, thanks to the integration of hardware (e.g., sensors, actuators) and network communications for collecting and exchanging data. In this digitization process, however, security challenges need to be taken into account in order to prevent information availability, integrity, and confidentiality from being compromised. In this paper, security challenges of two broadly used technologies, RFID (Radio Frequency Identification) and Bluetooth, are analyzed. First, a review of the main vulnerabilities, security risk, and threats affecting both technologies are carried out. Then, open hardware and open source tools like: Proxmark3 and Ubertooth as well as BtleJuice and Bleah are used as part of the practical analysis. Lastly, risk mitigation and counter measures are proposed. View Full-Text
Share & Cite This Article
Figueroa Lorenzo, S.; Añorga Benito, J.; García Cardarelli, P.; Alberdi Garaia, J.; Arrizabalaga Juaristi, S. A Comprehensive Review of RFID and Bluetooth Security: Practical Analysis. Technologies 2019, 7, 15.
Figueroa Lorenzo S, Añorga Benito J, García Cardarelli P, Alberdi Garaia J, Arrizabalaga Juaristi S. A Comprehensive Review of RFID and Bluetooth Security: Practical Analysis. Technologies. 2019; 7(1):15.Chicago/Turabian Style
Figueroa Lorenzo, Santiago; Añorga Benito, Javier; García Cardarelli, Pablo; Alberdi Garaia, Jon; Arrizabalaga Juaristi, Saioa. 2019. "A Comprehensive Review of RFID and Bluetooth Security: Practical Analysis." Technologies 7, no. 1: 15.
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.