Abstract

AbstractBluetooth devices have integrated into our everyday lives such that we see an increase in wearable technologies. Users of these devices are often unaware of the security vulnerabilities that come with the use of Bluetooth. To this aid, we provide a comprehensive analysis of the security attacks and ways for users to mitigate these attacks focusing on Bluetooth technologies by reviewing prior literature. Here we analyze \(N = 48\) peer-reviewed academic articles published in ACM and IEEE Digital Libraries. We investigate Bluetooth-specific attacks such as BlueSnarfing, Man-in-the-Middle for wearable technologies, MAC Address Spoofing, BLE-specific attacks, and others. Additionally, we analyze the papers detailing the malware targeting Bluetooth devices and compare our results with previous 15 prior systematization of knowledge (SoK) papers on Bluetooth attacks and mitigation measures. Additionally, in our review, we also provide a detailed analysis of the suggested mitigating measures, which include removing, repairing, or deleting access to devices that are no longer in use, utilizing Personal Identification Number (PIN) for user authentication, and other solutions. Thereafter, we conclude by providing actionable recommendations focused on wearable technology users.KeywordsBluetoothLiterature reviewSecurity threatsAttack mitigationWearable devices

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call