Bluetooth Low Energy (BLE) protocol and its security vulnerabilities
- BLE protocol provides encryption and authentication during pairing phase
- Three types of attacks on BLE: eavesdropping, jamming, and hijacking
- Hardware required for performing attacks on BLE devices
- Improvements in BLE version 5 include better range, throughput, and coexistence
- New channel selection algorithm introduced in BLE version 5
The speaker mentioned a tool called BTD Jack, which is like a 'fisherman knife' for performing attacks on BLE devices. This tool is compatible with the micro bit, a tiny device originally designed to teach UK students how to code. The speaker also mentioned that the TI Texas Instrument development board is more powerful but more expensive than the micro bit.