Skip to main content

Security for the Internet of Things and the Bluetooth Protocol

  • Conference paper
  • First Online:
Future Data and Security Engineering (FDSE 2018)

Abstract

This document analyzes the state of art regarding the security of the Internet of Things as well as some well-known vulnerability scenarios. Using the Blueborne exploit, we intend to take control of a mobile device, run malicious code on it and gain access to sensitive information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Höller, J., Tsiatsis, V., Mulligan, C., Karnouskos, S., Avesand, S., Boyle, D.: From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence, Amsterdam. Elsevier, The Netherlands (2014)

    Google Scholar 

  2. Yang, G., et al.: A health-IoT platform based on the integration of intelligent packaging unobtrusive bio-sensor and intelligent medicine box. IEEE Trans. Ind. Informat. 10(4), 2180–2191 (2014)

    Article  Google Scholar 

  3. Wilkin, R.: hackers-are-nowtargeting-car-washes, New York Post. https://nypost.com/2017/08/01/hackersare-now-targeting-car-washes/amp/

  4. Barcena, M.B., Wueest, C.: Security Response, Symantec (2015)

    Google Scholar 

  5. Zetter, K.: Hacker Can Send Fatal Dose to Hospital Drug Pumps. Wired. https://www.wired.com/2015/06/hackerscan-send-fatal-doses-hospital-drug-pumps/

  6. Vanhoef, M., Piessens, F.: Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2, November 2017. https://www.krackattacks.com/#paper

  7. Yang, W., Wan, Y., Wang, Q.: Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of Things. Institution of Engineering and Technology IET 2017, vol. 11, no. 6, p. 369–376. IEEE xplore (2017)

    Google Scholar 

  8. Beydemir, A., Sogukpinar, I.: Lightweight zero knowledge authentication for Internet of things. In: 2017 International Conference on Computer Science and Engineering (UBMK), Antalya, pp. 360–365 (2017)

    Google Scholar 

  9. Armis Labs. Blueborne – Technical White Paper 2017. Disponible en. http://go.armis.com/blueborne-technicalpaper

  10. Repositorio github con el código. https://github.com/ArmisSecurity/blueborneradare.org/r/

  11. Reverse Engineering Framework. https://www.radare.org/r/

  12. Armis Labs. https://www.armis.com/armis-labs/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rodrigo Alexander Fagua Arévalo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arévalo, R.A.F., Parra, O.J.S., Céspedes, J.M.S. (2018). Security for the Internet of Things and the Bluetooth Protocol. In: Dang, T., Küng, J., Wagner, R., Thoai, N., Takizawa, M. (eds) Future Data and Security Engineering. FDSE 2018. Lecture Notes in Computer Science(), vol 11251. Springer, Cham. https://doi.org/10.1007/978-3-030-03192-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03192-3_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03191-6

  • Online ISBN: 978-3-030-03192-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics