2019 IEEE Global Communications Conference (GLOBECOM) 2019
DOI: 10.1109/globecom38437.2019.9014318
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Algorithm for Sniffing BLE Long-Lived Connections in Real-Time

Abstract: Bluetooth Low Energy (BLE) has become an intrinsic wireless technology for the Internet of Things (IoT). With the proliferation of BLE-embedded IoT devices, it is important to study the security and privacy implications of BLE. The forefront attack to BLE devices is the wireless sniffing attack, which would lead to more detrimental threats like jamming, encryption cracking or system penetration. Existing sniffing attacks are based on the correct detection of BLE connection initiation state, but they become ine… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 12 publications
0
12
0
Order By: Relevance
“…Hop interval and hop increment remain the same for an established connection, but access address varies over time. The attacker observes a single channel at a time to determine these three pieces of information and can be aware of an access address change by keeping track of missed packets [97]. With all this information an attacker can even sniff without the initial connection setup information in BLE legacy connections.…”
Section: ) Passive Sniffingmentioning
confidence: 99%
“…Hop interval and hop increment remain the same for an established connection, but access address varies over time. The attacker observes a single channel at a time to determine these three pieces of information and can be aware of an access address change by keeping track of missed packets [97]. With all this information an attacker can even sniff without the initial connection setup information in BLE legacy connections.…”
Section: ) Passive Sniffingmentioning
confidence: 99%
“…For the 8-classes classification case, Friis and MLP present the worst total APC values (see Table 7), close to 25%. Friis has most of its values at classes [20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35] and [38-55] km/h, as shown in Figure 8. Similarly, as shown in Table 7, random forest and extra trees present similar accuracy values of less than 40%.…”
Section: Experimentation Using Eight Classesmentioning
confidence: 99%
“…The authors' detector proposition combines both Bluetooth and BLE RSSI sniffing capabilities [8,22], to provide real-time numerical information of people or vehicles inside tunnels. Locating users in space in case of an emergency means estimating the number of people involved in the situation, notifying them, and subsequently giving them instructions on avoiding imminent risks that cannot be spotted due to the conditions.…”
Section: Introductionmentioning
confidence: 99%
“…Especially, as in the previous research efforts [9,13-17], we only consider Bluetooth Classic in this paper. Since Ubertooth One also supports Bluetooth Low Energy (BLE) [24], AFH map prediction in BLE sniffers (e.g., [25]) could be considered as a future work.…”
Section: An Overview Of Bluetooth and Afhmentioning
confidence: 99%