Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini

dc.contributor.authorTuğrul Yüksel
dc.contributor.authorÖmer Aydın
dc.contributor.authorGökhan Dalkılıç
dc.date.accessioned2024-07-24T09:12:48Z
dc.date.available2024-07-24T09:12:48Z
dc.date.issued2022
dc.description.abstractIn today’s technology world, Virtual personal assistants (VPA) have become very common and most people have started making their homes smart using these VPAs. Although different companies have different assistants, Google Home Mini (GHM) will be our focus in this paper. The first device, Google Home, was released in November 2016 and then GHM was released after a year, in October 2017. GHM has many features such as playing music, setting reminders, setting kitchen timer and controlling smart home devices. Although GHM might be reliable against cyber-attacks, devices, which are paired with GHM, could be attacked and these cyber-attacks can lead to severe problems. Cyber-attack issues become more important to us, specifically if the devices controlled by GHM are vital devices such as oven, fire alarm, security camera. In this article, we will represent Denial of Service (DOS) attacks applied against devices which are paired with GHM. In this study, Bluedoser, L2ping, Bluetooth Dos Script which are software in Kali Linux platform were used in order to perform DoS attack and some devices were used such as Google Home Mini, Headphone, 2 speakers as victim device. Successful results were observed on Bluetooth headphone.
dc.identifier.DOI-ID10.18466/cbayarfbe.856119
dc.identifier.issn1305-130X
dc.identifier.urihttp://akademikarsiv.cbu.edu.tr:4000/handle/123456789/24795
dc.language.isoeng
dc.titlePerforming DoS Attacks on Bluetooth Devices Paired with Google Home Mini
dc.typeAraştırma Makalesi

Files