Skip to main content
. 2020 Jun 25;20(12):3590. doi: 10.3390/s20123590

Table 2.

Enhancements for Bluetooth Security.

Ref. Protocol Attack Manipulation
[77] BTCP -Protocol to Secure Scatternet Formation
-Efficient Against MITM Attack
[78] RAP-BE -Combined encrypted key exchange protocols
-Efficient Against DoS and Relay Attacks
[79] SEBSPP -Utilized strong public key exchange mechanism to Mitigate MITM
[80] SSBC -Implements double layered encryption to secure data communications
-Efficient Against MITM and Passive Eavesdropping Attacks
[81] PBBPP -Analysis of the shortcomings of Pin-Based Authentication Model
-Handles Password Guessing Attack
[82] ESBN -Developed Link Layer Security Mechanism
-Battle against MITM and Message Alterations
[83] PUF-AP -Physical Unclonable Function (PUF)-based authentication protocol
-Joint authentication and maintenance of secrecy for the session key
-MITM, Replay, Passive Eavesdropping, and Impersonation Attacks
[84] BC-GW -Blockchain-enabled IoT gateway for BLE-based devices
-Preserve user privacy and enforce user preferences when accessing IoT devices