Analyzing Vulnerabilities and Exploitation in Bluetooth Security of Wireless Communication: A Security Framework
Keywords:
Bluetooth; Bluetooth Low Energy; wireless security; vulnerabilities; exploitation; man-in-the-middle; denial-of-service; IoT security; IEEE 802.15.1Abstract
Bluetooth has emerged as a ubiquitous wireless technology in personal, IoT, and industrial devices. During the period 2020–2025, several security vulnerabilities were identified in both Classic Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) protocols, which support passive eavesdropping, man-in-the-middle (MITM), device impersonation, denial-of-service (DoS), and arbitrary code execution attacks. This survey study provides a current review of specification-level vulnerabilities (e.g., KNOB, BIAS, BLURtooth) and implementation flaws (e.g., SweynTooth, BrakTooth, BlueFrag), describes reported exploitation methods and case studies, and discusses countermeasures developed to counter these threats. We contrast the security designs of Classic and BLE, recognize upcoming trends like tighter key management and increased testing, and suggest coming defenses. It is our intention to enlighten professionals regarding the modern landscape of Bluetooth security and shape stronger wireless communications protections.