Analyzing Vulnerabilities and Exploitation in Bluetooth Security of Wireless Communication: A Security Framework

Authors

  • Zaeem Nazir Lecturer, Faculty of Computer Science, University of Narowal, Narowal, Punjab, Pakistan.
  • Muhammad Danish BSCS Scholar, Department of Information Science, Superior University, Lahore, Punjab, Pakistan.
  • Burhan Ali BSCS Scholar, Department of Information Science, Superior University, Lahore, Punjab, Pakistan.
  • Syed Pervez Hussnain Shah Lecturer, Department of Computer Science, Lahore Leads University, Lahore, Punjab, Pakistan.
  • Syed Samee Hasnain Lecturer, Department of Computer Science, Lahore Leads University, Lahore, Punjab, Pakistan.
  • Muhammad Akram Mujahid Assistant Professor, Department of Information Science, DSNT, University of Education, Lahore, Punjab, Pakistan.

Keywords:

Bluetooth; Bluetooth Low Energy; wireless security; vulnerabilities; exploitation; man-in-the-middle; denial-of-service; IoT security; IEEE 802.15.1

Abstract

Bluetooth has emerged as a ubiquitous wireless technology in personal, IoT, and industrial devices. During the period 2020–2025, several security vulnerabilities were identified in both Classic Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) protocols, which support passive eavesdropping, man-in-the-middle (MITM), device impersonation, denial-of-service (DoS), and arbitrary code execution attacks. This survey study provides a current review of specification-level vulnerabilities (e.g., KNOB, BIAS, BLURtooth) and implementation flaws (e.g., SweynTooth, BrakTooth, BlueFrag), describes reported exploitation methods and case studies, and discusses countermeasures developed to counter these threats. We contrast the security designs of Classic and BLE, recognize upcoming trends like tighter key management and increased testing, and suggest coming defenses. It is our intention to enlighten professionals regarding the modern landscape of Bluetooth security and shape stronger wireless communications protections.

Downloads

Published

2025-06-30

How to Cite

Nazir, Z. ., Danish, M. ., Ali , B. ., Shah, S. P. H. ., Hasnain, S. S. ., & Mujahid, M. A. . (2025). Analyzing Vulnerabilities and Exploitation in Bluetooth Security of Wireless Communication: A Security Framework. Journal of Interdisciplinary Innovational Letters, 2(1), 55–74. Retrieved from https://www.jiil.org.pk/index.php/Journal/article/view/9

Issue

Section

Articles