World Scientific
  • Search
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×
Our website is made possible by displaying certain online content using javascript.
In order to view the full content, please disable your ad blocker or whitelist our website www.worldscientific.com.

System Upgrade on Tue, Oct 25th, 2022 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at [email protected] for any enquiries.

The Importance of Applying Security Practices in Wireless Communication: Bluetooth Low Energy and RFID

    Security is a concept which people recognize as important, yet regularly ignore for reasons such as cost or design constraints. The world is quickly shifting towards the wireless with phenomena akin to the Internet of Thing (IoT) accelerating this progression. Technologies like Bluetooth Low Energy and Radio Frequency Identification are greatly entwined with this trend, and research has been made into reinforcing protection methods. However, security is a choice made by the designer and more often than not is given decreased priority. With the improved creativity and sophistication of malicious exploits this is becoming far less acceptable. Theft of data is trivial for a user with the correct skillset and will be successful without proper defences. Further research needs to be done in the field, and encouraging consistent security practices is an appropriate start.

    References

    • 1. H. Krawczyk, The order of encryption and authentication for protecting communications (or: How secure is SSL?), in Annual International Cryptology Conference (Springer, 2001), pp. 310–331. Google Scholar
    • 2. S. Ahuja and P. Potti, An introduction to RFID technology, Communications and Network 2(3) (2010) 183–186. Google Scholar
    • 3. B. Violino, The basics of RFID technology, RFID Journal (2005) 1–4. Google Scholar
    • 4. M. Buettner and D. Wetherall, An empirical study of UHF RFID performance, in Proceedings of the 14th ACM International Conference on Mobile Computing and Networking (ACM, 2008), pp. 223–234. Google Scholar
    • 5. S. Ajami and A. Rajabzadeh, Radio frequency identification (RFID) technology and patient safety, Journal of Research in Medical Sciences: The Official Journal of Isfahan University of Medical Sciences 18(9) (2013) 809. Google Scholar
    • 6. M. Mijwaart, Understanding the confusing world of RFID tags and readers in access control, October 2015, unpublished paper. Google Scholar
    • 7. E. Z. Singhal and E. A. Gupta, RFID: Unique identification technique for attendance system, IJREAS 2(2) (2012). Google Scholar
    • 8. D. Geiszler, What is Wiegand? A Brief History, Keri Systems Incorporated, July 2017. Google Scholar
    • 9. Understanding Card Data Formats, HID Global, 2006. Google Scholar
    • 10. C. M. Shah, V. B. Sangoi and R. M. Visharia, Smart security solutions based on internet of things (IOT), International Journal of Current Engineering and Technology 4(5) (2014) 3401–3406. Google Scholar
    • 11. S. K. Panigrahy, S. K. Jena and A. K. Turuk, Security in bluetooth, RFID and wireless sensor networks, in Proceedings of the 2011 International Conference on Communication, Computing & Security (ACM, 2011), pp. 628–633. Google Scholar
    • 12. J. Mander and D. Picopoulos, Bluetooth piconet applications, London’s Global University, London, 2005. Google Scholar
    • 13. U. M. Rijah, S. Mosharani, S. Amuthapriya, M. Mufthas, M. Hezretov and D. Dhammearatchi, Bluetooth security analysis and solution, International Journal of Scientific and Research Publications 6(4) (2016) 333–338. Google Scholar
    • 14. C. Gomez, J. Oller and J. Paradells, Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology, Sensors 12(9) (2012) 11734–11753. Google Scholar
    • 15. M. Verma, S. Singh and B. Kaur, An overview of bluetooth technology and its communication applications, International Journal of Current Engineering and Technology 5(3) (2015). Google Scholar
    • 16. Bluetooth 5 Technology Fundamentals and Critical Test Parameters, Keysight Technologies, October 2017. Google Scholar
    • 17. S Kaur, How to secure our bluetooth insecure world!, IETE Technical Review 30(2) (2013) 95–101. Google Scholar
    • 18. G. Corbellini, S. Schmid and S. Mangold, Two-way communication protocol using bluetooth low energy advertisement frames, in Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects (ACM, 2015), pp. 19–24. Google Scholar
    • 19. K. Cho, W. Park, M. Hong, G. Park, W. Cho, J. Seo and K. Han, Analysis of latency performance of bluetooth low energy (BLE) networks, Sensors 15(1) (2014) 59–78. Google Scholar
    • 20. T. Panse and P. Panse, A survey on security threats and vulnerability attacks on bluetooth communication, International Journal of Computer Science and Information Technologies 4(5) (2013) 741–746. Google Scholar
    • 21. Introduction to Bluetooth Low Energy – Developer Help, Microchip Developer Help, 2017. Google Scholar
    • 22. J. Kaur and N. Kehar, RFID enabled cards skimming: enhanced technology, in Proceedings of the International Conference on Advances in Computing and Artificial Intelligence (ACM, 2011), pp. 155–157. Google Scholar
    • 23. M. R. Rieback, B. Crispo and A. S. Tanenbaum, The evolution of RFID security, IEEE Pervasive Computing 5(1) (2006) 62–69. Google Scholar
    • 24. Q. Xiao, T. Gibbons, and H. Lebrun, Rfid technology, security vulnerabilities, and countermeasures, in Supply Chain the Way to Flat Organisation, InTech, 2009. Google Scholar
    • 25. A. W. Sr, L. S. Tsay, I. A. Kateeb and L. Burton, Solutions for RFID smart tagged card security vulnerabilities, AASRI Procedia 4 (2013) 282–287. Google Scholar
    • 26. L. R. A. Nagalakshmi, Deployment of RFID (radio frequency identification) at Indian academic libraries: Issues and best practice, International Journal of Library and Information Science 3(2) (2011) 34–37. Google Scholar
    • 27. D. Browning and G. C. Kessler, Bluetooth hacking: A case study, in Proceedings of the Conference on Digital Forensics, Security and Law (2009), pp. 115–128. Google Scholar
    • 28. J. Padgette, Guide to bluetooth security, NIST Special Publication, 800 (2017) 121. Google Scholar
    • 29. V. K. Dubey, K. Vaishali, N. Behar and M. Shrivastava, A review on bluetooth security vulnerabilities and a proposed prototype model for enhancing security against mitm attack proc, 2015. Google Scholar
    • 30. K. Saravanan, L. Vijayanand and R. Negesh, A novel bluetooth man-in-the-middle attack based on SSP using OOB association model, arXiv preprint arXiv:1203.4649, (2012). Google Scholar
    • 31. Core Specifications V5.0, Blueooth SIG, 2017. Google Scholar
    • 32. K. Mikhaylov, N. Plevritakis and J. Tervonen, Performance analysis and comparison of bluetooth low energy with IEEE 802.15. 4 and SimpliciTI, Journal of Sensor and Actuator Networks 2(3) (2013) 589–613. Google Scholar
    • 33. T. Phillips, T. Karygiannis and R. Kuhn, Security standards for the RFID market, IEEE Security & Privacy 3(6) (2005) 85–89. Google Scholar
    • 34. S. A. Weis, S. E. Sarma, R. L. Rivest and D. W. Engels, Security and privacy aspects of low-cost radio frequency identification systems, in Security in Pervasive Computing (Springer, 2004), pp. 201–212. Google Scholar
    • 35. RFID Hacking Tools & Downloads, Bishop Fox (2015). Google Scholar
    • 36. HID Proximity MaxiProx 5375, HID Global (2017). Google Scholar
    • 37. P. Stone, Hacking unicorns with web bluetooth (2017), unpublished paper. Google Scholar
    • 38. P. Stone, Cloudpets-Web-Bluetooth: Demo of Cloudpets toy functionality using Web Bluetooth (2017). Google Scholar