IoT Revealing – Not Simple but Possible

Abstract:

Internet of Things (IoT) is becoming more and more popular as a concept of interaction between smart devices designated to collect, send and act on data they acquire from their environment. There is a lot of wireless technologies supporting communication in IoT starting from a local range solutions, such as ZigBee or Bluetooth, to large, distributed networks based on LoRaWAN, Sigfox or Wi-Fi HaLow (IEEE 802.11ah). In each of them the security issues are critical and have the highest priority. In this paper, we focus on Bluetooth (BT) technology as a solution that is widely used in many devices to connect with peer devices and exchange data. The information which is exchanged is very often sensitive because it can help track people or monitor their health (in the case of wearable devices) or capture private files as is the case with smartphones. So, over the past few years, many security improvements have been made to the Bluetooth specification to protect against new recognized threats. This paper demonstrates possible attacks on Bluetooth devices such as sniffing, spoofing, firmware attacks using open-source software. Next, it discusses the methods of neutralizing these security vulnerabilities.