Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio

Mahyar TajDini,Volodymyr Sokolov,Volodymyr Buriachok
DOI: https://doi.org/10.48550/arXiv.1906.10878
2019-06-26
Cryptography and Security
Abstract:The article presents a method of organizing men-in-the-middle attack and penetration test on Bluetooth Low Energy devices and ZigBee packets using software define radio with sniffing and spoofing packets, capture and analysis techniques on wireless waves with the focus on Bluetooth. The paper contains the analysis of the latest scientific work in this area, provides a comparative analysis of SDRs and the rationale for the choice of hardware, gives the sequence of actions for collecting wireless data packets and data collection from ZigBee and BLE devices, and analyzes ways to improve captured wireless packet analysis techniques. For the study collected experimental setup, the results of which are analyzed in real time. The collected wireless data packets are compared with those sent. The result of the experiment shows the weaknesses of local wireless networks.
What problem does this paper attempt to address?