2016 IEEE Conference on Standards for Communications and Networking (CSCN) 2016
DOI: 10.1109/cscn.2016.7785169
|View full text |Cite
|
Sign up to set email alerts
|

On practical selective jamming of Bluetooth Low Energy advertising

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…This type of attack occurs in the physical layer. The perpetrator sends an unnecessary signal through the communication channel and creates radio noise between the connected devices [121] as illustrated in Fig. 10.…”
Section: ) Dos Using Jammingmentioning
confidence: 99%
“…This type of attack occurs in the physical layer. The perpetrator sends an unnecessary signal through the communication channel and creates radio noise between the connected devices [121] as illustrated in Fig. 10.…”
Section: ) Dos Using Jammingmentioning
confidence: 99%
“…Usually an attacker sending a PHY attack sends bits not following the communication protocol, preventing the data to be readable from an external IDS and making the attack extremely dif icult to detect. For example, authors in [36] propose an attack on the BLE physical layer which selectively jams the signal on speci ic channels whenever a device tries to connect. Instead of focusing on single protocols, other proposals have focused on creating IDSs capable of working on uniied IoT environment.…”
Section: Ids For Iotmentioning
confidence: 99%
“…Multiple active attacks have also been presented in recent years. First, jamming-based attacks have been explored by Brauer et al in [6], they demonstrated an attack allowing to selectively jam advertisements. D. Cauquil also presented a new offensive tool named BTLEJack [9] allowing to disrupt an existing connection by jamming packets transmitted by one of the devices involved in a connection, called Slave.…”
Section: Related Workmentioning
confidence: 99%