Download PDFOpen PDF in browserCurrent version

Hybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy Networks

EasyChair Preprint no. 10902, version 2

Versions: 12history
2 pagesDate: April 14, 2024

Abstract

As the foremost protocol for low-power communication, Bluetooth Low Energy (BLE) significantly impacts various aspects of our lives, including industry and healthcare. Given BLE’s inherent security limitations and firmware vulnerabilities, spoofing attacks can readily compromise BLE devices and jeopardize privacy data. In this paper, we introduce BLEGuard, a hybrid mechanism for detecting spoofing attacks in BLE networks. We established a physical Bluetooth system to conduct attack simulations and construct a substantial dataset (BLE-SAD). BLEGuard integrates pre-detection, reconstruction, and classification models to effectively identify spoofing activities, achieving an impressive preliminary accuracy of 99.01%, with a false alarm rate of 2.05% and an undetection rate of 0.36%.

Keyphrases: Bluetooth Low Energy, classification model, Cybersecurity, reconstruction model, spoofing attack

BibTeX entry
BibTeX does not have the right entry for preprints. This is a hack for producing the correct reference:
@Booklet{EasyChair:10902,
  author = {Hanlin Cai and Yuchen Fang and Jiacheng Huang and Meng Yuan and Zhezhuang Xu},
  title = {Hybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy Networks},
  howpublished = {EasyChair Preprint no. 10902},

  year = {EasyChair, 2024}}
Download PDFOpen PDF in browserCurrent version