
low energy in iot and wearable devices: A compre-
hensive survey. IEEE Open Journal of the Communi-
cations Society, 3:251–281.
Br
¨
auer, S., Zubow, A., Roshandel, M., Mashhadi Sohi, S.,
and Zehl, S. (2016). On practical selective jamming
of bluetooth low energy advertising.
Cominelli, M., Patras, P., and Gringoli, F. (2020). One gpu
to snoop them all: a full-band bluetooth low energy
sniffer.
Garbelini, M. E., Wang, C., Chattopadhyay, S., Sun, S., and
Kurniawan, E. (2020). Sweyntooth: Unleashing may-
hem over bluetooth low energy. In Gavrilovska, A.
and Zadok, E., editors, 2020 USENIX Annual Techni-
cal Conference, USENIX ATC 2020, July 15-17, 2020,
pages 911–925. USENIX Association.
Healey, R. and Ryan, M. (2020). Hacking elec-
tric skateboards: vehicle research for mortals.
https://media.defcon.org/DEFSkateboards.pdf, ac-
cessed 2023-12-07.
Jasek, S. (2016). Gattacking bluetooth smart devices.
https://www.blackhat.com/docs/us-16/materials/us-
16-Jasek-GATTacking-Bluetooth-Smart-Devices
-Introducing-a-New-BLE-Proxy-Tool.pdf, accessed
2024-02-11.
Kwon, G., Kim, J., Noh, J., and Cho, S. (2016). Blue-
tooth low energy security vulnerability and improve-
ment method. pages 1–4.
Lounis, K. and Zulkernine, M. (2019). Bluetooth low en-
ergy makes ”just works” not work. In 3rd Cyber Se-
curity in Networking Conference, CSNet 2019, Quito,
Ecuador, October 23-25, 2019, pages 99–106. IEEE.
Ray, A., Raj, V., Oriol, M., Monot, A., and Obermeier, S.
(2018). Bluetooth low energy devices security testing
framework. In 11th IEEE International Conference
on Software Testing, Verification and Validation, ICST
2018, V
¨
aster
˚
as, Sweden, April 9-13, 2018, pages 384–
393. IEEE Computer Society.
Rose, A. and Ramsey, B. (2020). Picking bluetooth
low energy locks from a quarter mile away.
https://media.defcon.org/DEF2024/DEFPicking -
Bluetooth - Low - Energy - Locks - UPDATED . pdf,
accessed on 2023-12-11.
Ryan, M. (2013). Bluetooth: With low energy comes low
security. In 7th USENIX Workshop on Offensive Tech-
nologies (WOOT 13), Washington, D.C. USENIX As-
sociation.
Sarawi, S., Anbar, M., Alieyan, K., and Alzubaidi, M.
(2017). Internet of things (iot) communication pro-
tocols : Review.
Sevier, S. and Tekeoglu, A. (2019). Analyzing the security
of bluetooth low energy. pages 1–5.
Shostack, A. (2014). Threat Modeling: Designing for Se-
curity. Wiley.
SIG, B. (2021). Bluetooth core spec version 5.3. Available
at https://www.bluetooth.com/specifications/specs/c
ore-specification-5-3/ (10.01.2023).
Skallak, C. (2023). Ble-berry framework: A framework
for bluetooth low energy development and penetration
testing. Master’s thesis, UAS Campus Wien, 1100 Vi-
enna, Austria.
Thiyeb, I., Saif, A., and Al-Shaibany, N. (2018). Ethical
network surveillance using packet sniffing tools: A
comparative study. International Journal of Computer
Network and Information Security, 10:12–22.
Uher, J., Mennecke, R., and Farroha, S. (2016). Denial of
sleep attacks in bluetooth low energy wireless sensor
networks. pages 1231–1236.
Wang, J., Hu, F., Zhou, Y., Liu, Y., Zhang, H., and Liu,
Z. (2020). Bluedoor: breaking the secure information
flow via ble vulnerability. In Proceedings of the 18th
International Conference on Mobile Systems, Appli-
cations, and Services, MobiSys ’20, page 286–298,
New York, NY, USA. Association for Computing Ma-
chinery.
Wu, J., Nan, Y., Kumar, V., Tian, D. J., Bianchi, A., Payer,
M., and Xu, D. (2020). BLESA: Spoofing attacks
against reconnections in bluetooth low energy. In 14th
USENIX Workshop on Offensive Technologies (WOOT
20). USENIX Association.
Zhang, Y., Weng, J., Dey, R., Jin, Y., Lin, Z., and Fu,
X. (2020). Breaking secure pairing of bluetooth low
energy using downgrade attacks. In Proceedings of
the 29th USENIX Conference on Security Symposium,
SEC’20, USA. USENIX Association.
IoTBDS 2024 - 9th International Conference on Internet of Things, Big Data and Security
350