Bluetooth Low Energy (BLE) Security and Privacy

Author(s):  
Yue Zhang ◽  
Jian Weng ◽  
Rajib Dey ◽  
Xinwen Fu
Author(s):  
Yue Zhang ◽  
Jian Weng ◽  
Rajib Dey ◽  
Xinwen Fu

2021 ◽  
Vol 2 (2) ◽  
pp. 1-33 ◽  
Author(s):  
Leonie Reichert ◽  
Samuel Brack ◽  
BjÖRN Scheuermann

To combat the ongoing Covid-19 pandemic, many new ways have been proposed on how to automate the process of finding infected people, also called contact tracing . A special focus was put on preserving the privacy of users. Bluetooth Low Energy as base technology has the most promising properties, so this survey focuses on automated contact tracing techniques using Bluetooth Low Energy. We define multiple classes of methods and identify two major groups: systems that rely on a server for finding new infections and systems that distribute this process. Existing approaches are systematically classified regarding security and privacy criteria.


2022 ◽  
Vol 8 (2) ◽  
pp. 1-27
Author(s):  
Qiang Tang

In the current COVID-19 pandemic, manual contact tracing has been proven to be very helpful to reach close contacts of infected users and slow down spread of the virus. To improve its scalability, a number of automated contact tracing (ACT) solutions have been proposed, and some of them have been deployed. Despite the dedicated efforts, security and privacy issues of these solutions are still open and under intensive debate. In this article, we examine the ACT concept from a broader perspective, by focusing on not only security and privacy issues but also functional issues such as interface, usability, and coverage. We first elaborate on these issues and particularly point out the inevitable privacy leakages in existing Bluetooth Low Energy based ACT solutions, including centralized and decentralized ones. In addition, we examine the existing venue-based ACT solutions and identify their privacy and security concerns. Then, we propose a generic venue-based ACT solution and a concrete instantiation based on Bluetooth Low Energy technology. Our solution monitors users’ contacting history only in virus-spreading-prone venues and offers higher-level protection for both security and privacy than its predecessors. Finally, we evaluate our solution from security, privacy, and efficiency perspectives, and also highlight how to reduce false positives in some specific indoor environments.


2022 ◽  
pp. 108712
Author(s):  
Matthias Cäsar ◽  
Tobias Pawelke ◽  
Jan Steffan ◽  
Gabriel Terhorst

Author(s):  
Jordan Frith

The phrase the Internet of things was originally coined in a 1999 presentation about attaching radio frequency identification (RFID) tags to individual objects. These tags would make the objects machine-readable, uniquely identifiable, and, most importantly, wirelessly communicative with infrastructure. This chapter evaluates RFID as a piece of mobile communicative infrastructure, and it examines two emerging forms: near-field communication (NFC) and Bluetooth low-energy beacons. The chapter shows how NFC and Bluetooth low-energy beacons may soon move some types of RFID to smartphones, in this way evolving the use of RFID in payment and transportation and enabling new practices of post-purchasing behaviors.


2020 ◽  
Vol 1631 ◽  
pp. 012162
Author(s):  
Yan Long ◽  
Yongli Chen ◽  
Deyong Xiao ◽  
Zheng Li ◽  
Tianpeng Hou ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document