2022
DOI: 10.1109/ojcoms.2022.3149732
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey

Abstract: Bluetooth Low Energy (BLE) has become the de facto communication protocol for the Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption, ease of development, good enough network coverage, and data transfer speed. Due to the simplified design of this protocol, there have been lots of security and privacy vulnerabilities. As billions of health care, personal fitness wearable, smart lock, industrial automation devices adopt this technology for communication, its vulnerabilities … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 70 publications
(25 citation statements)
references
References 132 publications
0
24
0
1
Order By: Relevance
“…Prediction and diagnosis: Although relying on AI algorithms and multimodal sensors can diagnose and predict diseases, however, the diagnostic and predictive capabilities based on big data and AI algorithms are still underdeveloped. The key to this lies in the analysis of the data, which often still relies on medical professionals and is not useful for users [ 1 , 2 , 15 ]. In addition, there are still very few diseases for which diagnosis and prediction are currently possible, which is also true for sports.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Prediction and diagnosis: Although relying on AI algorithms and multimodal sensors can diagnose and predict diseases, however, the diagnostic and predictive capabilities based on big data and AI algorithms are still underdeveloped. The key to this lies in the analysis of the data, which often still relies on medical professionals and is not useful for users [ 1 , 2 , 15 ]. In addition, there are still very few diseases for which diagnosis and prediction are currently possible, which is also true for sports.…”
Section: Discussionmentioning
confidence: 99%
“…Advances in new materials, advanced manufacturing, and flexible electronics technologies have improved comfort, real-time, and precision and expanded the range of applications. Notably, with the help of the internet of things [ 15 , 16 ], big data technology [ 17 , 18 ], and artificial intelligence algorithm [ 19 , 20 ], the vital signals monitored via flexible wearable sensors can be used not only by the user to decrease damage during exercise, rehabilitation, and daily life, but also medical staff. In addition, the use of flexible wearable sensors reduces markedly the frequency of visiting hospital visits, saves hospitalization expenses, and effectively improves the medical experience and the allocation of medical resources.…”
Section: Introductionmentioning
confidence: 99%
“…In these articles, different kinds of attacks were discussed. Article [ 29 ] showed the security flaws in Bluetooth and possible attacks on IoT using vulnerabilities of Bluetooth. Challenges of IoT are presented by others and a few of them are [ 30 , 31 , 32 ], etc.…”
Section: Related Workmentioning
confidence: 99%
“…In the near future, vast number of things connected to the Internet will need an IPv6 address since the IPv4 address space will be effectively consumed [41]. Accordingly, IPv6 addressing is now desirable as it provides 2 128 unique addresses or approximately Presents a detailed review of the security-related challenges and sources of threat in the IoT applications Shapla Khanam et al [20] Presents an overview of IoT, its system architecture, enabling technologies, and discusses security challenges Bin Liao et al [21] Analyzes the security of IoT devices and provides the countermeasures in response to security problems and challenges by using mobile computing Salma et al [22] Presents the challenges of IoT security and the security requirements needed by IoT systems Vishal et al [23] Surveys the security, privacy and trust for Smart Mobile-Internet of Things Ismail et al [24] Presents a review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks Pawani et al [25] Surveys the security considerations with 6G enabling technologies Shalitha et al [26] Surveys the exploitation of Network Slicing for Internet of Things in 5G Networks Van-Linh Nguyen et al [27] Surveys the security and privacy issues based on prospective technologies for 6G Dinh C. Nguyen et al [28] Surveys wireless artificial intelligence applications in various data-driven domains Yasmine et al [29] Provides an up-to-date vision of the current research topics related to IoT security and propose a taxonomy of IoT attacks and analyze the security vulnerabilities of IoT at different layers Pasika et al [30] Analyse the security and privacy of the Multi-Access Edge Computing system Zhiyuan Yu et al [31] Surveys the security and privacy problems arising from the interaction of cyber world and physical world, with the context of broad cyber-physical applications Euijong Lee et al [32] Surveys the international standards related to interoperability and security for IoT environments Xing et al [33] Provides an overview of IoT equipment's physical security and safety, antitheft and antivandalism schemes along with circuit and system design, additional sensing devices, biometry and behavior analysis, and tracking methods Arup et al [34] Surveys the security and privacy threats for bluetooth low energy in IoT and wearable devices Lijun et al [35] Analyse various dimensions of trust, dynamic changes of context, privacy preserving, and cross-domain issues Jiani et al [36] Provides general security guidelines for IoT-enabled smart city developments, highlights common security challenges and reviews recent cryptographic security implementations for IoT-enabled smart cities Emilie et al…”
Section: Iot Ecosystemmentioning
confidence: 99%