Переглядів 863
In this video, I discuss security issues with the the BLE protocol, and how its encryption can be bypassed. This video is based on a paper called -Bluetooth: With Low Energy comes Low Security.
---------------------------------------------------------------------------------------------------------------------------------------------------------------
SUPPORT MY CHANNEL
If you found this content useful, please consider buying me a coffee at the link below. This goes a long way in helping me through grad school and allows me to continue making the best content possible.
www.buymeacoffee.com/TheDataD...
Thanks for your support!
---------------------------------------------------------------------------------------------------------------------------------------------------------------
Link to my video on an Introduction to the Bluetooth Protocol:
• Intro To The Bluetooth...
Link to paper this video is based on:
www.usenix.org/system/files/c...
Other relevant links and sources:
Scholarly Articles
- ieeexplore.ieee.org/document/...
- doi.org/10.1016/j.adhoc.2019....
Web Articles
- www.mathworks.com/help/blueto...
- www.headphonesty.com/2021/01/...
- learn.sparkfun.com/tutorials/....