Table 2.
Enhancements for Bluetooth Security.
| Ref. | Protocol | Attack Manipulation |
|---|---|---|
| [77] | BTCP | -Protocol to Secure Scatternet Formation -Efficient Against MITM Attack |
| [78] | RAP-BE | -Combined encrypted key exchange protocols -Efficient Against DoS and Relay Attacks |
| [79] | SEBSPP | -Utilized strong public key exchange mechanism to Mitigate MITM |
| [80] | SSBC | -Implements double layered encryption to secure data communications -Efficient Against MITM and Passive Eavesdropping Attacks |
| [81] | PBBPP | -Analysis of the shortcomings of Pin-Based Authentication Model -Handles Password Guessing Attack |
| [82] | ESBN | -Developed Link Layer Security Mechanism -Battle against MITM and Message Alterations |
| [83] | PUF-AP | -Physical Unclonable Function (PUF)-based authentication protocol -Joint authentication and maintenance of secrecy for the session key -MITM, Replay, Passive Eavesdropping, and Impersonation Attacks |
| [84] | BC-GW | -Blockchain-enabled IoT gateway for BLE-based devices -Preserve user privacy and enforce user preferences when accessing IoT devices |