Figure 4: Experimental setup for sniffer for packet analysis.
6.1 Observations with Bluetooth Sniffer
Using the Bluetooth sniffer, we have made the follow-
ing key observations:
• Oneplus headsets and buds respond to adver-
tisement requests and cease transmission once a
connection is established. This observation led
to the development of our l2connect attack and
l2connect flooding attack. Detailed findings are
presented in Table 4.
• BoAt headsets behave differently, sending adver-
tising requests and accepting connections from
other devices even after a connection. This be-
haviour suggests that the l2connect attack is inef-
fective on the BoAt headsets. Detailed results are
presented in Table 2 and Table 4.
7 CONCLUSIONS
Our work analyses various DoS attack mechanisms
on Bluetooth devices. DoS attacks generally utilize
the basic version of l2ping. However, it lacks com-
prehensive DoS attack analysis capabilities. We de-
veloped our testbed, ”Bluedos”, to address this limi-
tation using the Bluez Linux protocol stack. Our ex-
periments involve sending l2ping requests and l2ping
request flooding to target devices and studying the at-
tack’s impact on various parameters like device re-
sponse time.
Observing the device’s behaviour, we introduced
two novel attacks, the l2connect attack and the
l2connect flooding attack. We successfully demon-
strated the attack’s efficacy against the Bluetooth de-
vices under study. The flooding attack disconnected
devices and prevented them from connecting to any
other device, rendering them unusable. We also exe-
cuted a D-DoS attack to analyse the impact of mul-
tiple attacking devices, which successfully discon-
nected the Boat headset, previously impervious to dis-
connection by a single attacking device. We attribute
this behaviour to a feature that allows devices to con-
nect with multiple devices simultaneously.
Finally, the Bluetooth sniffer allowed us to cross-
validate all observations and provide reasoning for the
behaviour of the Bluetooth devices in response to var-
ious packets and attack mechanisms used for the DoS
attack analysis.
REFERENCES
Barua, A., Al Alamin, M. A., Hossain, M. S., and Hossain,
E. (2022). Security and privacy threats for bluetooth
low energy in iot and wearable devices: A compre-
hensive survey. IEEE Open Journal of the Communi-
cations Society, 3:251–281.
C
¨
asar, M., Pawelke, T., Steffan, J., and Terhorst, G. (2022).
A survey on bluetooth low energy security and pri-
vacy. Computer Networks, 205:108712.
Ditton, S., Tekeoglu, A., Bekiroglu, K., and Srinivasan, S.
(2020). A proof of concept denial of service attack
against bluetooth iot devices. In 2020 IEEE Interna-
tional Conference on Pervasive Computing and Com-
munications Workshops (PerCom Workshops), pages
1–6.
Hassan, S. S., Bibon, S. D., Hossain, M. S., and Atiquzza-
man, M. (2018). Security threats in bluetooth technol-
ogy. Computers & Security, 74:308–322.
Jakobsson, M. and Wetzel, S. (2001). Security weaknesses
in bluetooth. In Cryptographers’ Track at the RSA
Conference, pages 176–191. Springer.
Kwon, G., Kim, J., Noh, J., and Cho, S. (2016). Blue-
tooth low energy security vulnerability and improve-
ment method. In 2016 IEEE International Conference
on Consumer Electronics-Asia (ICCE-Asia), pages 1–
4. IEEE.
NORDIC (2021). NRF52840 bluetooth sniffer. https:
//www.nordicsemi.com/products/nrf52840.
Phan, R. C.-W. and Mingard, P. (2012). Analyzing the se-
cure simple pairing in bluetooth v4. 0. Wireless Per-
sonal Communications, 64:719–737.
Qualcomm (2000). BlueZ bluetooth protocol stack. https:
//github.com/bluez/bluez.
Tucker, T., Searle, H., Butler, K., and Traynor, P. (2023).
Blue’s clues: Practical discovery of non-discoverable
bluetooth devices. In 2023 IEEE Symposium on Secu-
rity and Privacy (SP), pages 3098–3112.
Wang, H. (2001). Overview of bluetooth technology. State
College, PA: Department of Electrical Engineering,
Pennsylvania State University.
Y
¨
uksel, T., AYDIN,
¨
O., and DALKILIC¸ , G. (2022). Per-
forming dos attacks on bluetooth devices paired with
google home mini. Celal Bayar University Journal of
Science, 18(1):53–58.
BlueDoS: A Novel Approach to Perform and Analyse DoS Attacks on Bluetooth Devices
843