A Robust Algorithm for Sniffing BLE Long-Lived Connections in Real-time

Bluetooth Low Energy (BLE) has become an intrinsic wireless technology for the Internet of Things (IoT). With the proliferation of BLE-embedded IoT devices, it is important to study the security and privacy implications of BLE. The forefront attack to BLE devices is the wireless sniffing attack, whi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Sarkar, Sopan, Liu, Jianqing, Jovanov, Emil
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Sarkar, Sopan
Liu, Jianqing
Jovanov, Emil
description Bluetooth Low Energy (BLE) has become an intrinsic wireless technology for the Internet of Things (IoT). With the proliferation of BLE-embedded IoT devices, it is important to study the security and privacy implications of BLE. The forefront attack to BLE devices is the wireless sniffing attack, which would lead to more detrimental threats like jamming, encryption cracking or system penetration. Existing sniffing attacks are based on the correct detection of BLE connection initiation state, but they become ineffective for BLE long-lived connections. In this paper, we focus on the adversary setting with a low-cost single radio and develop a suite of real-time algorithms to determine the key parameters necessary to follow and sniff a BLE connection in the connected state. We implement our algorithms in the open source platform -Ubertooth One and evaluate its performance in terms of sniffing overhead and accuracy. By comparing with state-of-the-art schemes, experimental results show that our sniffer achieves much higher sniffing accuracy (over 80\%) and better stability to BLE operational dynamics.
doi_str_mv 10.48550/arxiv.1907.12782
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1907_12782</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1907_12782</sourcerecordid><originalsourceid>FETCH-LOGICAL-a672-8dcc7e75edc0345f37a7bf00be174c9e3e4a0b1ba7ab65d1b67c9bc878b8d72e3</originalsourceid><addsrcrecordid>eNotz8tKxDAUgOFsXMjoA7gyL5Ca9HbSZS3jKASEcfYll5MaaBNJ66BvL46u_t0PHyF3ghe1bBr-oPNXOBei41CIEmR5TQ49PSbzuW60n6eUw_a-UJ8yfYvB-xAn-qj2VKU4MRXO6OiQYkS7hRRXGiI9op7ZFha8IVdezyve_ndHTk_70_DM1OvhZegV0y2UTDprAaFBZ3lVN74CDcZzblBAbTussNbcCKNBm7ZxwrRgO2MlSCMdlFjtyP3f9iIZP3JYdP4ef0XjRVT9AMfvRjo</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>A Robust Algorithm for Sniffing BLE Long-Lived Connections in Real-time</title><source>arXiv.org</source><creator>Sarkar, Sopan ; Liu, Jianqing ; Jovanov, Emil</creator><creatorcontrib>Sarkar, Sopan ; Liu, Jianqing ; Jovanov, Emil</creatorcontrib><description>Bluetooth Low Energy (BLE) has become an intrinsic wireless technology for the Internet of Things (IoT). With the proliferation of BLE-embedded IoT devices, it is important to study the security and privacy implications of BLE. The forefront attack to BLE devices is the wireless sniffing attack, which would lead to more detrimental threats like jamming, encryption cracking or system penetration. Existing sniffing attacks are based on the correct detection of BLE connection initiation state, but they become ineffective for BLE long-lived connections. In this paper, we focus on the adversary setting with a low-cost single radio and develop a suite of real-time algorithms to determine the key parameters necessary to follow and sniff a BLE connection in the connected state. We implement our algorithms in the open source platform -Ubertooth One and evaluate its performance in terms of sniffing overhead and accuracy. By comparing with state-of-the-art schemes, experimental results show that our sniffer achieves much higher sniffing accuracy (over 80\%) and better stability to BLE operational dynamics.</description><identifier>DOI: 10.48550/arxiv.1907.12782</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2019-07</creationdate><rights>http://creativecommons.org/licenses/by-nc-sa/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1907.12782$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1907.12782$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Sarkar, Sopan</creatorcontrib><creatorcontrib>Liu, Jianqing</creatorcontrib><creatorcontrib>Jovanov, Emil</creatorcontrib><title>A Robust Algorithm for Sniffing BLE Long-Lived Connections in Real-time</title><description>Bluetooth Low Energy (BLE) has become an intrinsic wireless technology for the Internet of Things (IoT). With the proliferation of BLE-embedded IoT devices, it is important to study the security and privacy implications of BLE. The forefront attack to BLE devices is the wireless sniffing attack, which would lead to more detrimental threats like jamming, encryption cracking or system penetration. Existing sniffing attacks are based on the correct detection of BLE connection initiation state, but they become ineffective for BLE long-lived connections. In this paper, we focus on the adversary setting with a low-cost single radio and develop a suite of real-time algorithms to determine the key parameters necessary to follow and sniff a BLE connection in the connected state. We implement our algorithms in the open source platform -Ubertooth One and evaluate its performance in terms of sniffing overhead and accuracy. By comparing with state-of-the-art schemes, experimental results show that our sniffer achieves much higher sniffing accuracy (over 80\%) and better stability to BLE operational dynamics.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz8tKxDAUgOFsXMjoA7gyL5Ca9HbSZS3jKASEcfYll5MaaBNJ66BvL46u_t0PHyF3ghe1bBr-oPNXOBei41CIEmR5TQ49PSbzuW60n6eUw_a-UJ8yfYvB-xAn-qj2VKU4MRXO6OiQYkS7hRRXGiI9op7ZFha8IVdezyve_ndHTk_70_DM1OvhZegV0y2UTDprAaFBZ3lVN74CDcZzblBAbTussNbcCKNBm7ZxwrRgO2MlSCMdlFjtyP3f9iIZP3JYdP4ef0XjRVT9AMfvRjo</recordid><startdate>20190730</startdate><enddate>20190730</enddate><creator>Sarkar, Sopan</creator><creator>Liu, Jianqing</creator><creator>Jovanov, Emil</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20190730</creationdate><title>A Robust Algorithm for Sniffing BLE Long-Lived Connections in Real-time</title><author>Sarkar, Sopan ; Liu, Jianqing ; Jovanov, Emil</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a672-8dcc7e75edc0345f37a7bf00be174c9e3e4a0b1ba7ab65d1b67c9bc878b8d72e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Sarkar, Sopan</creatorcontrib><creatorcontrib>Liu, Jianqing</creatorcontrib><creatorcontrib>Jovanov, Emil</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sarkar, Sopan</au><au>Liu, Jianqing</au><au>Jovanov, Emil</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Robust Algorithm for Sniffing BLE Long-Lived Connections in Real-time</atitle><date>2019-07-30</date><risdate>2019</risdate><abstract>Bluetooth Low Energy (BLE) has become an intrinsic wireless technology for the Internet of Things (IoT). With the proliferation of BLE-embedded IoT devices, it is important to study the security and privacy implications of BLE. The forefront attack to BLE devices is the wireless sniffing attack, which would lead to more detrimental threats like jamming, encryption cracking or system penetration. Existing sniffing attacks are based on the correct detection of BLE connection initiation state, but they become ineffective for BLE long-lived connections. In this paper, we focus on the adversary setting with a low-cost single radio and develop a suite of real-time algorithms to determine the key parameters necessary to follow and sniff a BLE connection in the connected state. We implement our algorithms in the open source platform -Ubertooth One and evaluate its performance in terms of sniffing overhead and accuracy. By comparing with state-of-the-art schemes, experimental results show that our sniffer achieves much higher sniffing accuracy (over 80\%) and better stability to BLE operational dynamics.</abstract><doi>10.48550/arxiv.1907.12782</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1907.12782
ispartof
issn
language eng
recordid cdi_arxiv_primary_1907_12782
source arXiv.org
subjects Computer Science - Cryptography and Security
title A Robust Algorithm for Sniffing BLE Long-Lived Connections in Real-time
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T13%3A19%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Robust%20Algorithm%20for%20Sniffing%20BLE%20Long-Lived%20Connections%20in%20Real-time&rft.au=Sarkar,%20Sopan&rft.date=2019-07-30&rft_id=info:doi/10.48550/arxiv.1907.12782&rft_dat=%3Carxiv_GOX%3E1907_12782%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true