@inproceedings{8a8a0099e3444c20820e1dc9c398ff36,
title = "Securing bluetooth low energy locks from unauthorizedaccess and surveillance",
abstract = "This chapter describes several vulnerabilities that affect commercial and residential Bluetooth Low Energy security devices and outlines methods for exploiting plaintext, obfuscated and hard-coded passwords, brute forcing passwords and hashes, fuzzing commands and performing man-in-the-middle attacks. Evaluations reveal that 75% of the tested security and access control systems have vulnerabilities that grant unauthorized access. In addition to obtaining access, malicious actors can extract sensitive information that can be used to develop patterns of human behavior. This chapter discusses five solutions for preventing or mitigating Bluetooth Low Energy security breaches, most of which involve minimal implementation overhead on the part of developers.",
keywords = "Access control, Bluetooth low energy, Locks, Security, Vulnerabilities",
author = "Anthony Rose and Jason Bindewald and Benjamin Ramsey and Mason Rice and Barry Mullins",
note = "Publisher Copyright: {\textcopyright} IFIP International Federation for Information Processing 2017.; 11th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2017 ; Conference date: 13-03-2017 Through 15-03-2017",
year = "2017",
doi = "10.1007/978-3-319-70395-4_16",
language = "English",
isbn = "9783319703947",
series = "IFIP Advances in Information and Communication Technology",
publisher = "Springer New York LLC",
pages = "319--338",
editor = "Sujeet Shenoi and Mason Rice",
booktitle = "Critical Infrastructure Protection XI - 11th IFIP WG 11.10 International Conference, ICCIP 2017, Revised Selected Papers",
}