Extracting the Security Features Implemented in a Bluetooth le Connection
Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018
Bluetooth LE security, Bluetooth Low Energy, Bluetooth Smart
© 2018 IEEE. Since its introduction in 2010, Bluetooth Low Energy (LE) has seen an abrupt adoption by top companies in the world. From smartphones, PCs, tablets, smartwatches to fitness bands; Bluetooth Low Energy is being implemented more and more on technological devices. Even though the Bluetooth Special Interest Group includes and strongly recommends implementations for security features in their standards for Bluetooth LE devices, recent studies show that many Bluetooth devices do not follow the recommendations. Even worse consumers are rarely informed about what security features are implemented by the products they use. The ultimate goal in this study is to provide a mechanism for users to inform them of the security features implemented in a Bluetooth LE connection that they have initiated. To this end, we developed an app for Android phones that extracts the security features of a Bluetooth LE connection using the btsnoop log stored on the phone. We have verified the correctness of our app using the Frontline BPA Low Energy Analyzer.
Robles-Cordero, Angel M.; Zayas, William J.; and Peker, Yesem Kurt, "Extracting the Security Features Implemented in a Bluetooth le Connection" (2019). Faculty Bibliography. 2807.