BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection

03/30/2021
by   Muhammed Ali Yurdagul, et al.
0

Bluetooth Low Energy (BLE) has become one of the most popular wireless communication protocols and is used in billions of smart devices. Despite several security features, the hardware and software limitations of these devices makes them vulnerable to man-in-the-middle (MITM) attacks. Due to the use of these devices in increasingly diverse and safety-critical applications, the capability to detect MITM attacks has become more critical. To address this challenge, we propose the use of the response time behavior of a BLE device observed in relation to select read and write operations and introduce an activeMITM attack detection system that identifies changes in response time. Our measurements on several BLE devices show that theirresponse time behavior exhibits very high regularity, making it a very reliable attack indicator that cannot be concealed by an attacker. Test results show that our system can very accurately and quickly detect MITM attacks while requiring a simple learning approach.

READ FULL TEXT
research
07/31/2018

Cyber-attack Mitigation and Impact Analysis for Low-power IoT Devices

Recent years have seen exponential development in wireless sensor device...
research
11/19/2020

Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel

We introduce screen gleaning, a TEMPEST attack in which the screen of a ...
research
01/17/2023

Are Home Security Systems Reliable?

Home security systems have become increasingly popular since they provid...
research
02/20/2019

Misbinding Attacks on Secure Device Pairing

In identity misbinding attacks against authenticated key-exchange protoc...
research
11/13/2018

Detection and Prevention Against RTS Attacks in Wireless LAN

Widely deployed wireless network devices use a shared medium to communic...
research
12/16/2021

Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems

A whole range of attacks becomes possible when adversaries gain physical...
research
09/08/2020

Silicon Dating

In order to service an ever-growing base of legacy electronics, both gov...

Please sign up or login with your details

Forgot password? Click here to reset