{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T21:06:14Z","timestamp":1778274374075,"version":"3.51.4"},"publisher-location":"Cham","reference-count":75,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030939557","type":"print"},{"value":"9783030939564","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-93956-4_7","type":"book-chapter","created":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T08:03:00Z","timestamp":1641974580000},"page":"108-127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures"],"prefix":"10.1007","author":[{"given":"Sunny","family":"Shrestha","sequence":"first","affiliation":[]},{"given":"Esa","family":"Irby","sequence":"additional","affiliation":[]},{"given":"Raghav","family":"Thapa","sequence":"additional","affiliation":[]},{"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,12]]},"reference":[{"issue":"12","key":"7_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40\u201346 (1999). https:\/\/doi.org\/10.1145\/322796.322806","journal-title":"Commun. ACM"},{"issue":"4","key":"7_CR2","first-page":"25","volume":"8","author":"MA Albahar","year":"2016","unstructured":"Albahar, M.A., Haataja, K., Toivanen, P.: Bluetooth MITM vulnerabilities: a literature review, novel attack scenarios, novel countermeasures, and lessons learned. Int. J. Inf. Technol. Secur. 8(4), 25\u201349 (2016)","journal-title":"Int. J. Inf. Technol. Secur."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Albazrqaoe, W., Huang, J., Xing, G.: Practical bluetooth traffic sniffing: systems and privacy implications. In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016, p. 333\u2013345. Association for Computing Machinery, New York (2016)","DOI":"10.1145\/2906388.2906403"},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/TNET.2018.2880970","volume":"27","author":"W Albazrqaoe","year":"2019","unstructured":"Albazrqaoe, W., Huang, J., Xing, G.: A practical Bluetooth traffic sniffing system: design, implementation, and countermeasure. IEEE\/ACM Trans. Netw. 27(1), 71\u201384 (2019). https:\/\/doi.org\/10.1109\/TNET.2018.2880970","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"7_CR5","unstructured":"Alfaiate, J., Fonseca, J.: Bluetooth security analysis for mobile phones. In: 7th Iberian Conference on Information Systems and Technologies (CISTI 2012), pp. 1\u20136 (2012)"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Almiani, M., et al.: Bluetooth application-layer packet-filtering for blueborne attack defending. In: 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC), pp. 142\u2013148 (2019). https:\/\/doi.org\/10.1109\/FMEC.2019.8795354","DOI":"10.1109\/FMEC.2019.8795354"},{"issue":"3","key":"7_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3394497","volume":"23","author":"D Antonioli","year":"2020","unstructured":"Antonioli, D., Tippenhauer, N.O., Rasmussen, K.: Key negotiation downgrade attacks on Bluetooth and Bluetooth low energy. ACM Trans. Priv. Secur. 23(3), 1\u201328 (2020). https:\/\/doi.org\/10.1145\/3394497","journal-title":"ACM Trans. Priv. Secur."},{"key":"7_CR8","unstructured":"Arney, T.O.: A literature review on the current state of security and privacy of medical devices and sensors with Bluetooth low energy. Ph.D. thesis, Michigan Technological University (2018)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Bitton, R., Boymgold, K., Puzis, R., Shabtai, A.: Evaluating the information security awareness of smartphone users. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2020)","DOI":"10.1145\/3313831.3376385"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Bouhenguel, R., Mahgoub, I., Ilyas, M.: Bluetooth security in wearable computing applications. In: 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies, pp. 182\u2013186 (2008). https:\/\/doi.org\/10.1109\/HONET.2008.4810232","DOI":"10.1109\/HONET.2008.4810232"},{"issue":"2","key":"7_CR11","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MSP.2007.43","volume":"5","author":"L Carettoni","year":"2007","unstructured":"Carettoni, L., Merloni, C., Zanero, S.: Studying Bluetooth malware propagation: the bluebag project. IEEE Secur. Priv. 5(2), 17\u201325 (2007). https:\/\/doi.org\/10.1109\/MSP.2007.43","journal-title":"IEEE Secur. Priv."},{"key":"7_CR12","doi-asserted-by":"publisher","unstructured":"Classen, J., Hollick, M.: Happy MitM: fun and toys in every Bluetooth device. In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2021, pp. 72\u201377. Association for Computing Machinery, New York (2021). https:\/\/doi.org\/10.1145\/3448300.3467822","DOI":"10.1145\/3448300.3467822"},{"key":"7_CR13","doi-asserted-by":"publisher","unstructured":"Cope, P., Campbell, J., Hayajneh, T.: An investigation of Bluetooth security vulnerabilities. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1\u20137 (2017). https:\/\/doi.org\/10.1109\/CCWC.2017.7868416","DOI":"10.1109\/CCWC.2017.7868416"},{"key":"7_CR14","unstructured":"Das, S., Kim, A., Tingle, Z., Nippert-Eng, C.: All about phishing exploring user research through a systematic literature review. In: Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019) (2019)"},{"key":"7_CR15","unstructured":"Das, S., Wang, B., Tingle, Z., Camp, L.J.: Evaluating user perception of multi-factor authentication: a systematic review. In: Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019) (2019)"},{"key":"7_CR16","doi-asserted-by":"publisher","unstructured":"Dell, P., Ghori, K.S.H.: A simple way to improve the security of Bluetooth devices. In: 2008 International Symposium on Applications and the Internet, pp. 444\u2013447 (2008). https:\/\/doi.org\/10.1109\/SAINT.2008.39","DOI":"10.1109\/SAINT.2008.39"},{"issue":"2","key":"7_CR17","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSP.2010.3","volume":"8","author":"J Dunning","year":"2010","unstructured":"Dunning, J.: Taming the blue beast: a survey of Bluetooth based threats. IEEE Secur. Priv. 8(2), 20\u201327 (2010). https:\/\/doi.org\/10.1109\/MSP.2010.3","journal-title":"IEEE Secur. Priv."},{"key":"7_CR18","doi-asserted-by":"publisher","unstructured":"Ficco, M., D\u2019Arienzo, M., D\u2019Angelo, G.: A Bluetooth infrastructure for automatic services access in ubiquitous and nomadic computing environments. In: Proceedings of the 5th ACM International Workshop on Mobility Management and Wireless Access, pp. 17\u201324. Association for Computing Machinery, New York (2007). https:\/\/doi.org\/10.1145\/1298091.1298095","DOI":"10.1145\/1298091.1298095"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Ghallali, M., El Ouadghiri, D., Essaaidi, M., Boulmalf, M.: Mobile phones security: the spread of malware via MMS and Bluetooth, prevention methods. In: Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia, pp. 256\u2013259 (2011)","DOI":"10.1145\/2095697.2095750"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Ghori, M.R., Wan, T.C., Anbar, M., Sodhy, G.C., Rizwan, A.: Review on security in Bluetooth low energy mesh network in correlation with wireless mesh network security. In: 2019 IEEE Student Conference on Research and Development (SCOReD), pp. 219\u2013224. IEEE (2019)","DOI":"10.1109\/SCORED.2019.8896310"},{"key":"7_CR21","doi-asserted-by":"publisher","unstructured":"Grace, P., Surridge, M.: Towards a model of user-centered privacy preservation. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES 2017. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3098954.3104054","DOI":"10.1145\/3098954.3104054"},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Guo, Z., Harris, I.G., Jiang, Y., Tsaur, L.: An efficient approach to prevent battery exhaustion attack on BLE-based mesh networks. In: 2017 International Conference on Computing, Networking and Communications (ICNC), pp. 1\u20135 (2017). https:\/\/doi.org\/10.1109\/ICCNC.2017.7876092","DOI":"10.1109\/ICCNC.2017.7876092"},{"key":"7_CR23","series-title":"SpringerBriefs in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-642-40646-1_5","volume-title":"Bluetooth Security Attacks","author":"K Haataja","year":"2013","unstructured":"Haataja, K., Hypp\u00f6nen, K., Pasanen, S., Toivanen, P.: MITM attacks on Bluetooth. In: Haataja, K., Hypp\u00f6nen, K., Pasanen, S., Toivanen, P. (eds.) Bluetooth Security Attacks. BRIEFSCOMPUTER, pp. 61\u201370. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40646-1_5"},{"key":"7_CR24","unstructured":"Haataja, K., Hypponen, K., Toivanen, P.: Ten years of Bluetooth security attacks: lessons learned. Computer Science I Like, p. 45 (2011)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Haataja, K.M.J.: New efficient intrusion detection and prevention system for Bluetooth networks. In: Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, MOBILWARE 2008. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Brussels (2008)","DOI":"10.4108\/ICST.MOBILWARE2008.2469"},{"key":"7_CR26","doi-asserted-by":"publisher","unstructured":"Hager, C.T., Midkiff, S.F.: An analysis of Bluetooth security vulnerabilities. In: 2003 IEEE Wireless Communications and Networking, WCNC 2003, vol. 3, pp. 1825\u20131831 (2003). https:\/\/doi.org\/10.1109\/WCNC.2003.1200664","DOI":"10.1109\/WCNC.2003.1200664"},{"issue":"3","key":"7_CR27","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.dcan.2018.10.009","volume":"5","author":"ML Hale","year":"2019","unstructured":"Hale, M.L., Lotfy, K., Gamble, R.F., Walter, C., Lin, J.: Developing a platform to evaluate and assess the security of wearable devices. Digit. Commun. Netw. 5(3), 147\u2013159 (2019)","journal-title":"Digit. Commun. Netw."},{"key":"7_CR28","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.cose.2017.03.008","volume":"74","author":"SS Hassan","year":"2018","unstructured":"Hassan, S.S., Bibon, S.D., Hossain, M.S., Atiquzzaman, M.: Security threats in Bluetooth technology. Comput. Secur. 74, 308\u2013322 (2018)","journal-title":"Comput. Secur."},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Heinze, D., Classen, J., Rohrbach, F.: MagicPairing: Apple\u2019s take on securing Bluetooth peripherals. In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 111\u2013121 (2020)","DOI":"10.1145\/3395351.3399343"},{"key":"7_CR30","doi-asserted-by":"publisher","unstructured":"Hunt, R.: Emerging wireless personal area networks (WPANs): - an analysis of techniques, tools and threats. In: 2012 18th IEEE International Conference on Networks (ICON), pp. 274\u2013279 (2012). https:\/\/doi.org\/10.1109\/ICON.2012.6506569","DOI":"10.1109\/ICON.2012.6506569"},{"key":"7_CR31","doi-asserted-by":"publisher","unstructured":"Jamaluddin, J., Zotou, N., Edwards, R., Coulton, P.: Mobile phone vulnerabilities: a new generation of malware. In: 2004 IEEE International Symposium on Consumer Electronics, pp. 199\u2013202 (2004). https:\/\/doi.org\/10.1109\/ISCE.2004.1375935","DOI":"10.1109\/ISCE.2004.1375935"},{"key":"7_CR32","doi-asserted-by":"publisher","unstructured":"Jonsson, H., Olsson, C.M.: User privacy attitudes regarding proximity sensing. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3230833.3233270","DOI":"10.1145\/3230833.3233270"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Karim, I., Cicala, F., Hussain, S.R., Chowdhury, O., Bertino, E.: Opening Pandora\u2019s box through ATFuzzer: dynamic analysis of at interface for Android smartphones. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 529\u2013543 (2019)","DOI":"10.1145\/3359789.3359833"},{"issue":"4","key":"7_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3416125","volume":"1","author":"I Karim","year":"2020","unstructured":"Karim, I., Cicala, F., Hussain, S.R., Chowdhury, O., Bertino, E.: ATFuzzer: dynamic analysis framework of AT interface for Android smartphones. Digit. Threats Res. Pract. 1(4), 1\u201329 (2020)","journal-title":"Digit. Threats Res. Pract."},{"issue":"2","key":"7_CR35","doi-asserted-by":"publisher","first-page":"95","DOI":"10.4103\/0256-4602.110547","volume":"30","author":"S Kaur","year":"2013","unstructured":"Kaur, S.: How to secure our Bluetooth insecure world! Pushing frontiers with the first lady of emerging technologies. IETE Tech. Rev. 30(2), 95\u2013101 (2013)","journal-title":"IETE Tech. Rev."},{"key":"7_CR36","doi-asserted-by":"publisher","unstructured":"Kennedy, T., Hunt, R.: A review of WPAN security: attacks and prevention. In: Proceedings of the International Conference on Mobile Technology, Applications, and Systems, Mobility 2008. Association for Computing Machinery, New York (2008). https:\/\/doi.org\/10.1145\/1506270.1506342","DOI":"10.1145\/1506270.1506342"},{"key":"7_CR37","doi-asserted-by":"publisher","unstructured":"Lee, H., Choi, K., Chung, K., Kim, J., Yim, K.: Fuzzing can packets into automobiles. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pp. 817\u2013821 (2015). https:\/\/doi.org\/10.1109\/AINA.2015.274","DOI":"10.1109\/AINA.2015.274"},{"issue":"3","key":"7_CR38","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/jsan7030028","volume":"7","author":"AM Lonzetta","year":"2018","unstructured":"Lonzetta, A.M., Cope, P., Campbell, J., Mohd, B.J., Hayajneh, T.: Security vulnerabilities in Bluetooth technology as used in IoT. J. Sens. Actuator Netw. 7(3), 28 (2018)","journal-title":"J. Sens. Actuator Netw."},{"key":"7_CR39","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-030-81111-2_16","volume-title":"Human Aspects of Information Security and Assurance","author":"JM Jones","year":"2021","unstructured":"Jones, J.M., Duezguen, R., Mayer, P., Volkamer, M., Das, S.: A literature review on virtual reality authentication. In: Furnell, S., Clarke, N. (eds.) HAISA 2021. IAICT, vol. 613, pp. 189\u2013198. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81111-2_16"},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Majumdar, R., Das, S.: SoK: an evaluation of quantum authentication through systematic literature review. In: Proceedings of the Workshop on Usable Security and Privacy (USEC) (2021)","DOI":"10.2139\/ssrn.3859056"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Mantz, D., Classen, J., Schulz, M., Hollick, M.: InternalBlue-Bluetooth binary patching and experimentation framework. In: Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, pp. 79\u201390 (2019)","DOI":"10.1145\/3307334.3326089"},{"issue":"1","key":"7_CR42","doi-asserted-by":"publisher","first-page":"127","DOI":"10.5121\/ijdps.2012.3110","volume":"3","author":"NBNI Minar","year":"2012","unstructured":"Minar, N.B.N.I., Tarique, M.: Bluetooth security threats and solutions: a survey. Int. J. Distrib. Parallel Syst. 3(1), 127 (2012)","journal-title":"Int. J. Distrib. Parallel Syst."},{"issue":"3\u20134","key":"7_CR43","doi-asserted-by":"crossref","first-page":"e2020","DOI":"10.1002\/cav.2020","volume":"32","author":"N Noah","year":"2021","unstructured":"Noah, N., Das, S.: Exploring evolution of augmented and virtual reality education space in 2020 through systematic literature review. Comput. Animation Virtual Worlds 32(3\u20134), e2020 (2021)","journal-title":"Comput. Animation Virtual Worlds"},{"key":"7_CR44","doi-asserted-by":"publisher","unstructured":"O\u2019Connor, T.J., Sangster, B.: HoneyM: a framework for implementing virtual honeyclients for mobile devices. In: Proceedings of the Third ACM Conference on Wireless Network Security, WiSec 2010, pp. 129\u2013138. Association for Computing Machinery, New York (2010). https:\/\/doi.org\/10.1145\/1741866.1741888","DOI":"10.1145\/1741866.1741888"},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"Oliff, W., Filippoupolitis, A., Loukas, G.: Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 379\u2013385. IEEE (2017)","DOI":"10.1109\/SERA.2017.7965755"},{"key":"7_CR46","doi-asserted-by":"publisher","unstructured":"Oliff, W., Filippoupolitis, A., Loukas, G.: Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. In: Proceedings of the 1st International Conference on Internet of Things and Machine Learning, IML 2017. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3109761.3109776","DOI":"10.1145\/3109761.3109776"},{"key":"7_CR47","doi-asserted-by":"crossref","unstructured":"Pallavi, S., Narayanan, V.A.: An overview of practical attacks on BLE based IoT devices and their security. In: 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), pp. 694\u2013698. IEEE (2019)","DOI":"10.1109\/ICACCS.2019.8728448"},{"key":"7_CR48","doi-asserted-by":"crossref","unstructured":"Panigrahy, S.K., Jena, S.K., Turuk, A.K.: Security in Bluetooth, RFID and wireless sensor networks. In: Proceedings of the 2011 International Conference on Communication, Computing & Security, pp. 628\u2013633 (2011)","DOI":"10.1145\/1947940.1948071"},{"issue":"5","key":"7_CR49","first-page":"741","volume":"4","author":"T Panse","year":"2013","unstructured":"Panse, T., Panse, P.: A survey on security threats and vulnerability attacks on Bluetooth communication. Int. J. Comput. Sci. Inf. Technol. 4(5), 741\u2013746 (2013)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"7_CR50","doi-asserted-by":"publisher","unstructured":"Peters, T., Lal, R., Varadarajan, S., Pappachan, P., Kotz, D.: BASTION-SGX: Bluetooth and architectural support for trusted I\/O on SGX. In: Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3214292.3214295","DOI":"10.1145\/3214292.3214295"},{"key":"7_CR51","doi-asserted-by":"publisher","unstructured":"Podhradsky, A.L., Casey, C., Ceretti, P.: The Bluetooth honeypot project. In: Wireless Telecommunications Symposium 2012, pp. 1\u201310 (2012). https:\/\/doi.org\/10.1109\/WTS.2012.6266078","DOI":"10.1109\/WTS.2012.6266078"},{"key":"7_CR52","doi-asserted-by":"publisher","unstructured":"Qu, Y., Chan, P.: Assessing vulnerabilities in Bluetooth low energy (BLE) wireless network based IoT systems. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 42\u201348 (2016). https:\/\/doi.org\/10.1109\/BigDataSecurity-HPSC-IDS.2016.63","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.63"},{"key":"7_CR53","doi-asserted-by":"publisher","unstructured":"Ray, A., Raj, V., Oriol, M., Monot, A., Obermeier, S.: Bluetooth low energy devices security testing framework. In: 2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST), pp. 384\u2013393 (2018). https:\/\/doi.org\/10.1109\/ICST.2018.00045","DOI":"10.1109\/ICST.2018.00045"},{"issue":"4","key":"7_CR54","first-page":"333","volume":"6","author":"UM Rijah","year":"2016","unstructured":"Rijah, U.M., Mosharani, S., Amuthapriya, S., Mufthas, M., Hezretov, M., Dhammearatchi, D.: Bluetooth security analysis and solution. Int. J. Sci. Res. Publ. 6(4), 333\u2013338 (2016)","journal-title":"Int. J. Sci. Res. Publ."},{"issue":"6","key":"7_CR55","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1177\/1932296819864416","volume":"14","author":"W Saltzstein","year":"2020","unstructured":"Saltzstein, W.: Bluetooth wireless technology cybersecurity and diabetes technology devices. J. Diabetes Sci. Technol. 14(6), 1111\u20131115 (2020)","journal-title":"J. Diabetes Sci. Technol."},{"key":"7_CR56","doi-asserted-by":"crossref","unstructured":"Sandhya, S., Devi, K.S.: Contention for man-in-the-middle attacks in Bluetooth networks. In: 2012 Fourth International Conference on Computational Intelligence and Communication Networks, pp. 700\u2013703. IEEE (2012)","DOI":"10.1109\/CICN.2012.72"},{"key":"7_CR57","doi-asserted-by":"crossref","unstructured":"Sethi, M., Peltonen, A., Aura, T.: Misbinding attacks on secure device pairing and bootstrapping. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 453\u2013464. Association for Computing Machinery, New York (2019)","DOI":"10.1145\/3321705.3329813"},{"key":"7_CR58","doi-asserted-by":"crossref","unstructured":"Shaked, Y., Wool, A.: Cracking the Bluetooth pin. In: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, pp. 39\u201350. Association for Computing Machinery, New York (2005)","DOI":"10.1145\/1067170.1067176"},{"key":"7_CR59","doi-asserted-by":"crossref","unstructured":"Singel\u00e9e, D., Preneel, B.: Location privacy in wireless personal area networks. In: Proceedings of the 5th ACM Workshop on Wireless Security, pp. 11\u201318 (2006)","DOI":"10.1145\/1161289.1161292"},{"key":"7_CR60","doi-asserted-by":"publisher","unstructured":"Snader, R., Kravets, R., Harris, A.F.: CryptoCoP: lightweight, energy-efficient encryption and privacy for wearable devices. In: Proceedings of the 2016 Workshop on Wearable Systems and Applications, WearSys 2016, pp. 7\u201312. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2935643.2935647","DOI":"10.1145\/2935643.2935647"},{"key":"7_CR61","doi-asserted-by":"crossref","unstructured":"Stowell, E., et al.: Designing and evaluating mHealth interventions for vulnerable populations: a systematic review. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1\u201317 (2018)","DOI":"10.1145\/3173574.3173589"},{"key":"7_CR62","doi-asserted-by":"publisher","unstructured":"Streiff, J., Das, S., Cannon, J.: Overpowered and underprotected toys empowering parents with tools to protect their children. In: 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), pp. 322\u2013329 (2019). https:\/\/doi.org\/10.1109\/CIC48465.2019.00045","DOI":"10.1109\/CIC48465.2019.00045"},{"key":"7_CR63","doi-asserted-by":"crossref","unstructured":"Su, J., et al.: A preliminary investigation of worm infections in a Bluetooth environment. In: Proceedings of the 4th ACM Workshop on Recurring Malcode, pp. 9\u201316. Association for Computing Machinery, New York (2006)","DOI":"10.1145\/1179542.1179545"},{"issue":"1","key":"7_CR64","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s00779-017-1081-6","volume":"22","author":"DZ Sun","year":"2018","unstructured":"Sun, D.Z., Mu, Y., Susilo, W.: Man-in-the-middle attacks on secure simple pairing in Bluetooth standard V5.0 and its countermeasure. Pers. Ubiquit. Comput. 22(1), 55\u201367 (2018). https:\/\/doi.org\/10.1007\/s00779-017-1081-6","journal-title":"Pers. Ubiquit. Comput."},{"key":"7_CR65","doi-asserted-by":"crossref","unstructured":"Tan, M., Masagca, K.A.: An investigation of Bluetooth security threats. In: 2011 International Conference on Information Science and Applications, pp. 1\u20137. IEEE (2011)","DOI":"10.1109\/ICISA.2011.5772388"},{"key":"7_CR66","doi-asserted-by":"publisher","unstructured":"Velez, D., Shanblatt, M.: Taxonomy of current medical devices for POCT applications and the potential acceptance of Bluetooth technology for secure interoperable applications. In: 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, pp. 288\u2013295 (2011). https:\/\/doi.org\/10.1109\/HEALTH.2011.6026767","DOI":"10.1109\/HEALTH.2011.6026767"},{"key":"7_CR67","doi-asserted-by":"publisher","unstructured":"Walter, C., Hale, M.L., Gamble, R.F.: Imposing security awareness on wearables. In: Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, SEsCPS 2016, pp. 29\u201335. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2897035.2897038","DOI":"10.1145\/2897035.2897038"},{"key":"7_CR68","doi-asserted-by":"publisher","unstructured":"Wang, J., Hu, F., Zhou, Y., Liu, Y., Zhang, H., Liu, Z.: BlueDoor: breaking the secure information flow via BLE vulnerability. In: Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services, MobiSys 2020, pp. 286\u2013298. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3386901.3389025","DOI":"10.1145\/3386901.3389025"},{"key":"7_CR69","doi-asserted-by":"publisher","unstructured":"Willingham, T., Henderson, C., Kiel, B., Haque, M.S., Atkison, T.: Testing vulnerabilities in Bluetooth low energy. In: Proceedings of the ACMSE 2018 Conference, ACMSE 2018. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3190645.3190693","DOI":"10.1145\/3190645.3190693"},{"key":"7_CR70","doi-asserted-by":"publisher","unstructured":"Woodhouse, S.: Information security: end user behavior and corporate culture. In: 7th IEEE International Conference on Computer and Information Technology (CIT 2007), pp. 767\u2013774 (2007). https:\/\/doi.org\/10.1109\/CIT.2007.186","DOI":"10.1109\/CIT.2007.186"},{"key":"7_CR71","doi-asserted-by":"publisher","unstructured":"Yamamoto, D., Tanaka, R., Kajioka, S., Matsuo, H., Takahashi, N.: Global map matching using BLE beacons for indoor route and stay estimation. In: Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, SIGSPATIAL 2018, pp. 309\u2013318. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3274895.3274918","DOI":"10.1145\/3274895.3274918"},{"key":"7_CR72","doi-asserted-by":"publisher","unstructured":"Yan, G., Eidenbenz, S.: Bluetooth worms: models, dynamics, and defense implications. In: 2006 22nd Annual Computer Security Applications Conference (ACSAC 2006), pp. 245\u2013256 (2006). https:\/\/doi.org\/10.1109\/ACSAC.2006.18","DOI":"10.1109\/ACSAC.2006.18"},{"key":"7_CR73","doi-asserted-by":"crossref","unstructured":"Yan, Z., et al.: Finding the weakest links in the weakest link: how well do undergraduate students make cybersecurity judgment? Comput. Hum. Behav. 84, 375\u2013382 (2018). https:\/\/doi.org\/10.1016\/j.chb.2018.02.019. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0747563218300773","DOI":"10.1016\/j.chb.2018.02.019"},{"issue":"11","key":"7_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-019-1440-0","volume":"43","author":"M Yaseen","year":"2019","unstructured":"Yaseen, M., et al.: MARC: a novel framework for detecting MITM attacks in eHealthcare BLE systems. J. Med. Syst. 43(11), 1\u201318 (2019). https:\/\/doi.org\/10.1007\/s10916-019-1440-0","journal-title":"J. Med. Syst."},{"key":"7_CR75","doi-asserted-by":"crossref","unstructured":"Zubair, M., Unal, D., Al-Ali, A., Shikfa, A.: Exploiting Bluetooth vulnerabilities in e-health IoT devices. In: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems. Association for Computing Machinery, New York (2019)","DOI":"10.1145\/3341325.3342000"}],"container-title":["Communications in Computer and Information Science","Emerging Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93956-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T18:40:34Z","timestamp":1700073634000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93956-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030939557","9783030939564"],"references-count":75,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93956-4_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"12 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Emerging Information Security and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eisa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eisa.compute.dtu.dk\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}