{"id":7717,"date":"2022-07-15T09:17:07","date_gmt":"2022-07-15T09:17:07","guid":{"rendered":"https:\/\/www.beaconzone.co.uk\/blog\/?p=7717"},"modified":"2022-07-15T09:17:08","modified_gmt":"2022-07-15T09:17:08","slug":"research-into-bluetooth-beacon-security","status":"publish","type":"post","link":"https:\/\/www.beaconzone.co.uk\/blog\/research-into-bluetooth-beacon-security\/","title":{"rendered":"Research into Bluetooth Beacon Security"},"content":{"rendered":"\n<p>There&#8217;s recent useful research into Bluetooth beacon security from The University of Hong Kong. The paper on <a rel=\"noreferrer noopener\" href=\"https:\/\/arxiv.org\/abs\/2107.05868\" target=\"_blank\">Security and Privacy of Wireless Beacon Systems<\/a> explains how widespread deployment of Bluetooth beacons can cause them to be an attractive target for adversaries.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"795\" height=\"714\" src=\"https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2022\/06\/bluetoothtypesofattack.png\" alt=\"\" class=\"wp-image-7718\" srcset=\"https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2022\/06\/bluetoothtypesofattack.png 795w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2022\/06\/bluetoothtypesofattack-300x269.png 300w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2022\/06\/bluetoothtypesofattack-768x690.png 768w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/figure><\/div>\n\n\n<p>The paper covers security issues and privacy concerns and classifies the possible types of attack.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"777\" height=\"470\" src=\"https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2022\/06\/classificationofbeaconattacks.png\" alt=\"\" class=\"wp-image-7719\" srcset=\"https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2022\/06\/classificationofbeaconattacks.png 777w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2022\/06\/classificationofbeaconattacks-300x181.png 300w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2022\/06\/classificationofbeaconattacks-768x465.png 768w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/figure>\n\n\n\n<p>The three main reasons for attacks are for free riding services, user profiling or service disruption.<\/p>\n\n\n\n<p>Understanding adversary motives, capabilities and the potential impact allows for defence mechanisms and planning for remedial actions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s recent useful research into Bluetooth beacon security from The University of Hong Kong. The paper on Security and Privacy of Wireless Beacon Systems explains how widespread deployment of Bluetooth beacons can cause them to be an attractive target for adversaries. The paper covers security issues and privacy concerns and classifies the possible types of &hellip; <a href=\"https:\/\/www.beaconzone.co.uk\/blog\/research-into-bluetooth-beacon-security\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Research into Bluetooth Beacon Security&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[61],"tags":[],"_links":{"self":[{"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7717"}],"collection":[{"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=7717"}],"version-history":[{"count":1,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7717\/revisions"}],"predecessor-version":[{"id":7720,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7717\/revisions\/7720"}],"wp:attachment":[{"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=7717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=7717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=7717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}