Full Paper View Go Back

Bluetooth: Enabling Technology for IoT, Security issues and solutions

Zahoor Ahmad Najar1 , Roohe Naaz Mir2

Section:Research Paper, Product Type: Journal-Paper
Vol.7 , Issue.7 , pp.58-63, Jul-2021


Online published on Jul 31, 2021


Copyright © Zahoor Ahmad Najar, Roohe Naaz Mir . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Zahoor Ahmad Najar, Roohe Naaz Mir, “Bluetooth: Enabling Technology for IoT, Security issues and solutions,” International Journal of Scientific Research in Multidisciplinary Studies , Vol.7, Issue.7, pp.58-63, 2021.

MLA Style Citation: Zahoor Ahmad Najar, Roohe Naaz Mir "Bluetooth: Enabling Technology for IoT, Security issues and solutions." International Journal of Scientific Research in Multidisciplinary Studies 7.7 (2021): 58-63.

APA Style Citation: Zahoor Ahmad Najar, Roohe Naaz Mir, (2021). Bluetooth: Enabling Technology for IoT, Security issues and solutions. International Journal of Scientific Research in Multidisciplinary Studies , 7(7), 58-63.

BibTex Style Citation:
@article{Najar_2021,
author = { Zahoor Ahmad Najar, Roohe Naaz Mir},
title = {Bluetooth: Enabling Technology for IoT, Security issues and solutions},
journal = {International Journal of Scientific Research in Multidisciplinary Studies },
issue_date = {7 2021},
volume = {7},
Issue = {7},
month = {7},
year = {2021},
issn = {2347-2693},
pages = {58-63},
url = {https://www.isroset.org/journal/IJSRMS/full_paper_view.php?paper_id=2451},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRMS/full_paper_view.php?paper_id=2451
TI - Bluetooth: Enabling Technology for IoT, Security issues and solutions
T2 - International Journal of Scientific Research in Multidisciplinary Studies
AU - Zahoor Ahmad Najar, Roohe Naaz Mir
PY - 2021
DA - 2021/07/31
PB - IJCSE, Indore, INDIA
SP - 58-63
IS - 7
VL - 7
SN - 2347-2693
ER -

265 Views    256 Downloads    98 Downloads
  
  

Abstract :
— Internet of things(IoT) a ubiquitous network, an interconnecting large number of devices roughly to stretch 1.1 trillion by 2026. The number of devices or things is increasing per person, and an average of 5 devices per user will be in use and actively connected to the Internet. However, an exponential increase in the number of devices nearly automates everything around us because of the technology available. The communication technology involved has a significant role in realizing IoT networks. In particular, wireless communication technology has helped to accomplish the IoT concept because of no overhead of wires. In wireless communication technology, several standards are available, e.g., Wi-Fi, Zigbee, Bluetooth, RFID, etc. All the standards used have their utility and use, as per their specification, capability, and energy consumption. In this paper, we discuss the use and importance of Bluetooth Technology in IoT and address security loopholes associated with it to prevent such vulnerability. References to the literature and mathematical symbols/equations should not be included.

Key-Words / Index Term :
Bluetooth, Wi-Fi, IoT, Security

References :
[1] Doukas, C.” Building Internet of Things with the Arduino.” CreateSpace Independent Publishing Platform, North Charleston, SC, USA pp-347, 2012.
[2] Lee, J.S., Su, Y.W., Shen, C.C.” A comparative study of wireless protocols: Bluetooth, UWB, ZigBee, and Wi-Fi.” 33rd Annual Conference of the IEEE Industrial Electronics Society (IECON 2007), pp. 46–51, (November 2007.
[3] D. Uckelmann, "Performance measurement and cost benefit analysis for RFID and Internet of Things implementations in logistics" in Quantifying the Value of RFID and the EPCglobal Architecture Framework in Logistics, New York, NY, USA:Springer-Verlag, pp. 71-100, 2012.
[4] P. C. Angela M. Lonzetta , Joseph Campbell, Bassam J. Mohd and Thaier Hayajneh, "Security Vulnerabilities in Bluetooth Technology as Used in IoT," Journal of Sensor and Actuator Networks vol. 7, no. 28, 2018.
[5] John Padgette ,John Bahr ,Mayank Batra, Marcel Holtmann, Rhonda Smithbey,Lily Chen, and Karen Scarfon “Guide to BluetoothSecurity” NIST Special Publication 800-121 Revision 2 , Natl. Inst. Stand. Technol. Spec. Publ. 800-121 Rev. 2, pp 8, May 2017.
[6] Melamed, T. “An Active Man-in-the-Middle Attack on Bluetooth Smart Devices”. Int. J. Safety & Security. Eng. , 2018.
[7] Nawir, M.; Amir, A.; Yaakob, N.; Lynn, O. “Internet of Things (IoT): Taxonomy of Security Attacks”. In Proceedings of the 3rd International Conference on Electronic Design (ICED), Phuket, Thailand, pp 11–12, 2016
[8] Nateq Be-Nazir Ibn, M.; Tarique, M. “Bluetooth security threats and solutions: A survey”.Int. J. Distrib.Parallel Syst. Vol 3 pp 127 2012.
[9] Herfurt, “Introducing the Car Whisperer at What the Hack.”https://trifinite.org/trifinite_stuff_carwhisperer.html, 2005. Accessed:2020-01-19.
[10] A. Laurie, M. Holtmann, and M. Herfurt, “Hacking Bluetooth EnabledMobile Phones and Beyond.” http://www.blackhat.com/html/bh-europe-05/bh-eu-05-speakers.html, 2007. Accessed: 2020-01-19.
[11] N. O. T. Daniele Antonioli, Kasper Rasmussen, "The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR," Proceedings of the 28th USENIX Security Symposium. Santa Clara, CA, USAAugust 14–16, 2019

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation