Abstract
Over the last few years, Bluetooth technology has been deployed in millions of devices including laptops, watches, mobile phones, cars, printer, and many other devices. It has been rapidly adopted as a short-range wireless communication technology for different IoT applications such as smart cities, smart healthcare, and smart grids. Yet, little attention has been paid to Bluetooth security. In this paper, we report a new Bluetooth vulnerability, named connection dumping. We show that this vulnerability can be exploited to affect Bluetooth availability. We generate three attack scenarios which exploit the vulnerability to cause disconnection between Bluetooth devices. We also generate attack scenarios for Bluetooth role switching and connection deprivation. We demonstrate the occurrences of the attacks on Bluetooth devices made by various manufacturers, running different Bluetooth versions and operating systems, and recommend possible mitigations for them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only