K.A. Muravyov1, V.O. Zacharova2, E.A. Saluev3, T.N. Makhmudov4
1–4 Bauman Moscow State Technical University
At all times, information has been a coveted resource. Attackers, by capturing data in some cases, have been able to significantly affect the world. Today's world is unimaginable without wireless communication. Countless electronic devices transfer data between each other using Bluetooth and Wi-Fi, and unfortunately, they are not perfect. Every day intruders intercept gigabytes of confidential information. In this work we investigate this problem and give advice on preventing unauthorized access to the data transmitted via wireless means of communication, as well as make a practical attack on BLE devices.
Purpose – to conduct a study of methods of information security technologies of wireless networks Wi-Fi and Bluetooth, and consider the basic methods of various attacks, ways to counteract unauthorized penetration of the elements of the Internet of things.
This article summarizes and studies methods of information security technologies of wireless networks Wi-Fi and Bluetooth. Also, the basic methods of various attacks on devices that support Wi-Fi and Bluetooth technology, ways to counter unauthorized access to the elements of Internet of things, a study of Bluetooth Low Energy (BLE). According to the results of the attack on Bluetooth Low Energy, it was found that all that is needed for a successful attack is knowledge of the characteristics of the device, which are publicly available in the documentation of the device.
The work provides recommendations for protecting against unauthorized access to information transmitted via Bluetooth wireless technology and Wi-Fi. If you take into account all these methods of protection, the manufacturers will be able to make their devices with the highest degree of protection, while users, based on these tips can increasingly protect themselves from unauthorized attacks. This work provides the necessary information about wireless networks Bluetooth and Wi-Fi. Also in this work is done unauthorized attack on BLE devices. This is done to demonstrate the vulnerability of Bluetooth wireless technology.
Muravyov K.A., Zacharova V.O., Saluev E.A., Makhmudov T.N. Study of methods to ensure information security of wireless networks. Dynamics of complex systems. 2023. V. 17. № 1. P. 13−29. DOI: 10.18127/j19997493-202301-02 (in Russian)
- Shakhnov V.A., Filin S.S., Krivoshein A.I., Vlasov A.I. Sustainable energy systems in the digital economy: concept of smart machines. Entrepreneurship and Sustainability Issues. 2019. V. 6. № 4. P. 1975–1986 (in Russian).
- Vlasov A.I., Zaharov E.R., Zaharova V.O. Nejrosetevaya sistema obnaruzheniya i nejtralizacii udalennogo nesankcionirovannogo vmeshatel'stva v komponenty interneta veshchej. Nejrokomp'yutery: razrabotka, primenenie. 2021. T. 23. № 1. S. 63-80 DOI: 10.18127/j19998554-202101-07 (in Russian).
- Zaharov E.R., Kurnosenko A.E., Leonidov V.V., Semenyakina V.O. Server dlya sistemy «umnyj dom» na baze mikrokontrollera ESP32. Proektirovanie i tekhnologiya elektronnyh sredstv. 2020. № 2. S. 28–35 (in Russian).
- Chernikov K.A. Kriptografiya v sistemah zashchity programmnogo obespecheniya. Zashchita informacii. Insajd. 2008. № 6 (24). S. 43–47 (in Russian).
- Shahnov V.A., Ahmetov N.R., Vlasov A.I., Dimitrov D.A., Du H., Zhalnin V.P., Shanin A.V., Sherstyuk A.E. Perspektivnaya elementnaya baza dlya smart-sistem v usloviyah cifrovoj transformacii promyshlennosti. Datchiki i sistemy. 2021. № 1 (254). S. 9–17 (in Russian).
- Pohodun A.I., Osin A.V. Obespechenie bezopasnosti interneta veshchej na osnove tekhnologii blokchejn. Telekommunikacii i informacionnye tekhnologii. 2018. T. 5. № 2. S. 72–78 (in Russian).
- Berdyugina O.N., Krivoshein A.I., Vlasov A.I. Technological platform for innovative social infrastructure development on basis of smart machines and principles of internet of things. Proceedings – 2018 Global Smart Industry Conference, GloSIC 2018. P. 8570062.
- Yudin A.V., Shakhnov V.A., Usov K.A., Salmina M.A., Vlasov A.I. Design methods of teaching the development of internet of things components with considering predictive maintenance on the basis of mechatronic devices. International Journal of Applied Engineering Research. 2017. V. 12. № 20. P. 9390–9396.
- Zhalnin V.P., Zakharova A.S., Uzenkov D.A., Vlasov A.I., Krivoshein A.I., Filin S.S. Configuration-making algorithm for the smart machine controller based on the internet of things concept. International Review of Electrical Engineering. 2019. V. 14. № 5. P. 375–384.
- Samyj prostoj sposob vzloma Wi-Fi [Elektronnyj resurs] – Rezhim dostupa: https://hackware.ru/?p=670 (in Russian)
- Kniga «Vzlom Wi-Fi setej s Kali Linux i BlackArch» [Elektronnyj resurs] – Rezhim dostupa: https://hackware.ru/?p=372 (in Russian)
- Vyborochnoe glushenie Wi-Fi setej i klientov (DoS ataka na otdel'nye tochki dostupa/klientov) [Elektronnyj resurs] –Rezhim dostupa: https://hackware.ru/?p=1751 (in Russian)
- Wi-Fi seti: proniknovenie i zashchita [Elektronnyj resurs] – Rezhim dostupa: https://habr.com/ru/post/224955/ (in Russian)
- Znakomstvo s Bluetooth, problemy bezopasnosti i novogodnij War-nibbling [Elektronnyj resurs] – Rezhim dostupa: https://securelist.ru/znakomstvo-s-bluetooth-problemy-bezopasnosti/772/ (in Russian)
- Namiot D.E. Besprovodnye tegi na osnove Bluetooth-ustrojstv
- Internet veshchej [Elektronnyj resurs] – Rezhim dostupa: https://ru.wikipedia.org/wiki/Internet_veshchej (in Russian)
- Internet veshchej: ponyatie, infrastruktura i perspektivy [Elektronnyj resurs] – Rezhim dostupa: https://vc.ru/flood/95013-internet-veshchey-ponyatie-infrastruktura-iperspektivy (in Russian)