Security and Privacy of Wireless Beacon Systems (original) (raw)
Related papers
2021
In connection with the ongoing COVID-19 pandemic, contact tracing mobile applications (e.g., that leverage Wi-Fi and Bluetoothâ„¢ Low Energy (BLE)) are being deployed. Many of those applications are susceptible to different security attacks. To address those types of challenges, techniques are presented herein that provide a multi-tiered mechanism for an optimized genuine client neighbor filtering technique that, among other things, may detect, score, and filter fake BLE advertisement attacks to improve the efficacy of the overall contact tracing application ecosystem and reduce airtime utilization from fake advertisements in the industrial, scientific and medical (ISM) frequency bands. For example, a man-in-the-middle (MITM) or other adversary may attach a mobile device to a carrier (such as a dog, car, flying drone, etc.) that advertises proximity identifiers to the devices of unsuspecting people. Additionally, the presented techniques address device power and storage drain that are...
Assessing Vulnerabilities in Bluetooth Low Energy (BLE) Wireless Network based IoT Systems
With the advent of the internet of things (IoT), big data analytic and cloud computing services had also got tremendous breadth in the evaluation of more secure computing environments, such as better resource management and vulnerability analysis. Since its inception in 2013, Bluetooth Low Energy (BLE) has become the standard for short-distance wireless communication in many consumer devices, as well as special-purpose devices. Bluetooth Low Energy (BLE) has become a remarkable success. Due to its unique properties of low power requirements and its ubiquitous availability in practically every smartphone, it outnumbered classic Bluetooth BR/EDR in most areas. To accurately assess the vulnerability of Bluetooth low energy (BLE) wireless network enabled IoT systems, we proposed a novel approach to extend the calculation formula for Authentication, which is one of the variables used in the conventional base score equations of the National Infrastructure Advisory Council's Common Vulnerability Scoring System (CVSS) v2. We demonstrated the weakness of the current CVSS v2 base score equations and how to overcome the weakness using an example BLE wireless network-based shopping cart IoT system.
Security Vulnerabilities in Bluetooth Technology as Used in IoT
Journal of Sensor and Actuator Networks
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low-cost solution for short-range radio transmissions. Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant technology for connecting IoT (Internet of Things). It can be found in cell phones, headsets, speakers, printers, keyboards, automobiles, children’s toys, and medical devices, as well as many other devices. The technology can also be found in automated smart homes, to provide monitors and controls for lights, thermostats, door locks, appliances, security systems, and cameras. Bluetooth offers convenience and ease of use, but it lacks a centralized security infrastructure. As a result, it has serious security vulnerabilities, and the need for awareness of the security risks are increasing as the technology becomes more widespread. This paper presents an overview of Bluetooth technology in IoT including its security, vulnerabilities, threats, and risk mi...
Security in Bluetooth, RFID and wireless sensor networks
2011
Recently, new families of wireless ad hoc networks have emerged for specialized applications-personal area networks. Wireless personal area networks (WPAN) is rapidly gaining popularity. A wide variety of traditional computing devices and embedded Internet appliances are networked around us. However, due to the broadcast nature of these networks and the heterogeneity of devices on these networks, new security problems will arise, because the different types of devices have different capabilities and security requirements. In this paper, an overview of security issues like attacks and its countermeasures for wireless personal area networks such as Bluetooth, RFID and wireless sensor networks has been provided.
Exploration of Various Attacks and Security Measures Related to the Internet of Things
Regular, 2020
In this era of technological advances, it will be impractical to think of a day without the usage of gadgets. Development and popularity of the Internet of Things have helped mankind a lot in several ways, but at the same time, there has also been an increase in attacks invading the underlying security. Advances in studies have resulted in the development of evolved algorithms that can be used in order to reduce the attacks and threats to the Internet of Things. With several advancements in studies and research works, the security measures on various Internet of Things based components and protocols are developing with time, but concurrently more advanced threats and attacks on these components are also evolving. These attacks are not only harmful to the components, but rather they also affect the users and applications that are associated with it, by breaching data, increase in inconsistency and inaccuracy, and many more. This work deals with the study of several attacks that are a...
Cybersecurity Attacks On Wireless Sensor Networks In Smart Cities: An Exposition
International Journal of Scientific & Technology Research, 2020
The smart city concept is a link between digital world and the physical world. The smart city is designed and constructed by using advanced techniques which consist of sensors, electronics and networks. However, automatic information flow and connection between IoT devices creates new security risks. If data can be accessed remotely, it means that a cybercriminal could also access it. Moreover, connectivity is the essence of IoT. If multiple devices are connected to the same network, it means that cybercriminals have multiple access points. Understanding how wireless sensor technology works is crucial before deploying IoT applications. In this article, we explore the understanding through: (1) vulnerabilities on wireless sensors and techniques to avoid them, (2) emerging wireless standards for sensors, and (3) what role these standards will play in the future.
Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures
IEEE Communications Surveys & Tutorials
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. However, owing to the absence of a physical line-of-defense, i.e. there is no dedicated infrastructure such as gateways to watch and observe the flowing information in the network, security of WSNs along with IoT is of a big concern to the scientific community. More specifically, for the application areas in which CIA (confidentiality, integrity, availability) has prime importance, WSNs and emerging IoT technology might constitute an open avenue for the attackers. Besides, recent integration and collaboration of WSNs with IoT will open new challenges and problems in terms of security. Hence, this would be a nightmare for the individuals using these systems as well as the security administrators who are managing those networks. Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper. In this text, attacks are categorized and treated into mainly two parts, most or all types of attacks towards WSNs and IoT are investigated under that umbrella: "Passive Attacks" and "Active Attacks". Understanding these attacks and their associated defense mechanisms will help paving a secure path towards the proliferation and public acceptance of IoT technology.
WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2021
This paper discusses the security of wireless communication protocols of the Internet of Things (IoT) and presents a new attack targeting these protocols, called WazaBee, which could have a critical impact and be difficult to detect. Specifically, WazaBee is a pivotal attack aimed at hijacking BLE devices, commonly used in IoT networks, in order to communicate with and possibly attack through a different wireless network technology, considering protocols based on 802.15.4, in particular Zigbee. We present the key principles of the attack and describe some real-world experiments that allowed us to demonstrate its practical feasibility. The attack takes advantage of the compatibility that exists between the two modulation techniques used by these two protocols. Finally, the paper briefly discusses possible countermeasures to mitigate the impact of this attack.
Security threats in Bluetooth technology
Computers & Security, 2017
His research interests include mobility of IPv6 networks, security, scalability and survivability of mobile networks, Software defined networking and Internet of Things. He has several conference and journal papers published by IEEE, Elsevier and Springer.