Ai, Mingrui, Kaiping Xue, Bo Luo, Lutong Chen, Nenghai Yu, Qibin Sun, and Feng Wu. 2022. “Blacktooth: Breaking through the Defense of Bluetooth in Silence.” In Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery, 55–68. doi:10.1145/3548606.3560668.
Ariyadi, Tamsir, and M. Rizky Pohan. 2023. “Implementation of Penetration Testing Tools to Test Wi-Fi Security Levels at the Directorate of Innovation and Business Incubators.” Jurnal Penelitian Pendidikan IPA 9(12): 10768–75. doi:10.29303/jppipa.v9i12.5551.
Arreaga, Nestor X., Genessis M. Enriquez, Sara Blanc, and Rebeca Estrada. 2023. “Security Vulnerability Analysis for IoT Devices Raspberry Pi Using PENTEST.” In Procedia Computer Science, Elsevier B.V., 223–30. doi:10.1016/j.procs.2023.09.031.
Bella, Giampaolo, Pietro Biondi, Stefano Bognanni, and Sergio Esposito. 2023. “PETIoT: PEnetration Testing the Internet of Things.” Internet of Things (Netherlands) 22. doi:10.1016/j.iot.2023.100707.
Bhardwaj, Akashdeep, Salil Bharany, Anas W. Abulfaraj, Ashraf Osman Ibrahim, and Wamda Nagmeldin. 2024. “Fortifying Home IoT Security: A Framework for Comprehensive Examination of Vulnerabilities and Intrusion Detection Strategies for Smart Cities.” Egyptian Informatics Journal 25. doi:10.1016/j.eij.2024.100443.
Cäsar, Matthias, Tobias Pawelke, Jan Steffan, and Gabriel Terhorst. 2022. “A Survey on Bluetooth Low Energy Security and Privacy.” Computer Networks 205. doi:10.1016/j.comnet.2021.108712.
Cook, Stephen, Royal Holloway, Maryam Merhnezad, Ehsan Toreini, and Maryam Mehrnezhad. 2024. “Bluetooth Vulnerabilities in General and Intimate Health IoT Devices and Apps: The Case of Female-Oriented Technologies.” doi:10.21203/rs.3.rs-3877210/v1.
Fatima, Haram, Habib Ullah Khan, and Shahzad Akbar. 2021. “Home Automation and RFID-Based Internet of Things Security: Challenges and Issues.” Security and Communication Networks 2021. doi:10.1155/2021/1723535.
Heiding, Fredrik, Emre Süren, Johannes Olegård, and Robert Lagerström. 2023. “Penetration Testing of Connected Households.” Computers and Security 126. doi:10.1016/j.cose.2022.103067.
Md Zaglul Shahadat, Mhia, Matsive Ali, Avijit Mallik, and M Matsive Ali. 2023. An Approach on Cracking WPA,WPA2 Security of Wi-Fi with Handshake Attack. https://www.researchgate.net/publication/368241744.
Nor Naematul Saadah, Ismail, and Zolkipli Mohamad Fadli. 2023. 184 International Journal of Computer Applications Preliminary Review of Phishing Attacks and Countermeasures on the Internet of Things (IoT) Environment.
Rachakonda, Lakshmi Priya, Madhuri Siddula, and Vanlin Sathya. 2024. “A Comprehensive Study on IoT Privacy and Security Challenges with Focus on Spectrum Sharing in Next-Generation Networks(5G/6G/Beyond).” High-Confidence Computing: 100220. doi:10.1016/j.hcc.2024.100220.
Rudrakar, Santoshi, and Parag Rughani. 2023. “IoT Based Agriculture (Ag-IoT): A Detailed Study on Architecture, Security and Forensics.” Information Processing in Agriculture. doi:10.1016/j.inpa.2023.09.002.
Sadikin, Fal, Nuruddin Wiranda, Jl Brigjen, Jalan Hasan Basri, Kec Banjarmasin Utara, Kota Banjarmasin, and Kalimantan Selatan. 2023. Sadikin and Wiranda-Investigation and Penetration of Digital Attacks on Zigbee-Based IOT Systems INVESTIGATION AND PENETRATION OF DIGITAL ATTACKS ON ZIGBEE-BASED IOT SYSTEMS.
Sarker, Kamal Uddin, Farizah Yunus, and Aziz Deraman. 2023. “Penetration Taxonomy: A Systematic Review on the Penetration Process, Framework, Standards, Tools, and Scoring Methods.” Sustainability (Switzerland) 15(13). doi:10.3390/su151310471.
Schiller, Eryk, Andy Aidoo, Jara Fuhrer, Jonathan Stahl, Michael Ziörjen, and Burkhard Stiller. 2022. “Landscape of IoT Security.” Computer Science Review 44. doi:10.1016/j.cosrev.2022.100467.
Shrestha, Sunny, Esa Irby, Raghav Thapa, and Sanchari Das. 2021. SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures. doi:http://dx.doi.org/10.2139/ssrn.3959316.
Winston James, DrJoy. 2023. Evaluating IoT Device Security: Penetration Testing and Vulnerability Assessment with Flipper Zero. https://ssrn.com/abstract=4658141.
Yaacoub, Jean Paul A., Hassan N. Noura, Ola Salman, and Ali Chehab. 2023. “Ethical Hacking for IoT: Security Issues, Challenges, Solutions and Recommendations.” Internet of Things and Cyber-Physical Systems 3: 280–308. doi:10.1016/j.iotcps.2023.04.002.
- Abstract viewed - 689 times
- Pdf downloaded - 2 times
Affiliations
Azran Abdul Razak
Jabatan Teknologi Maklumat dan Komunikasi (JTMK), Politeknik Tuanku Syed Sirajuddin (PTSS), Arau, Perlis, Malaysia
Mohamad Fadli Zolkipli
School of Computing, Universiti Utara Malaysia (UUM), 06010 Sintok, Kedah, MALAYSIA
How to Cite
A Preliminary Analysis of Bluetooth and Wi-Fi Security in Residential IoT Ecosystems
Vol 7 No 2 (2024): June
Submitted: Apr 1, 2024
Published: Jun 4, 2024
Abstract
In the context of residential IoT ecosystems, the paper explores the security landscape of popular communication protocols, including Bluetooth and Wi-Fi. The research attempts to uncover possible hazards, weaknesses, and concerns related to the adoption of IoT devices in home settings that use various communication protocols through a methodical process. Authentication methods, encryption techniques, and the general strength of security features in widely used smart devices are important areas of study. The results of the investigation highlight how urgently enhanced security measures are needed in the quickly developing field of residential Internet of Things (IoT) systems. Expanding on knowledge from earlier studies on IoT vulnerabilities, protecting consumer environments demands a comprehensive approach. Prospects could assist with creating a smart home environment that is safer and more reliable by implementing the recommendations made by the researchers into the implementation and use of IoT devices in the residential area. Protecting the interconnected structure of residential IoT ecosystems requires proactive measures and properly educated decision-making, as the field of Internet of Things (IoT) security continues to grow.