Threat Intelligence for Bluetooth-enabled Systems with Automotive Applications: An Empirical Study

被引:2
|
作者
Cheah, Madeline [1 ]
Bryans, Jeremy [1 ]
Fowler, Daniel S. [1 ]
Shaikh, Siraj Ahmed [1 ]
机构
[1] Coventry Univ, Ctr Mobil & Transport Res, Coventry CV1 5FB, W Midlands, England
关键词
automotive; Bluetooth; cybersecurity; infotainment;
D O I
10.1109/DSN-W.2017.22
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modern vehicles are opening up, with wireless interfaces such as Bluetooth integrated in order to enable comfort and safety features. Furthermore a plethora of aftermarket devices introduce additional connectivity which contributes to the driving experience. This connectivity opens the vehicle to potentially malicious attacks, which could have negative consequences with regards to safety. In this paper, we survey vehicles with Bluetooth connectivity from a threat intelligence perspective to gain insight into conditions during real world driving. We do this in two ways: firstly, by examining Bluetooth implementation in vehicles and gathering information from inside the cabin, and secondly, using war-nibbling (general monitoring and scanning for nearby devices). We find that as the vehicle age decreases, the security (relatively speaking) of the Bluetooth implementation increases, but that there is still some technological lag with regards to Bluetooth implementation in vehicles. We also find that a large proportion of vehicles and aftermarket devices still use legacy pairing (and are therefore more insecure), and that these vehicles remain visible for sufficient time to mount an attack (assuming some premeditation and preparation). We demonstrate a real-world threat scenario as an example of the latter. Finally, we provide some recommendations on how the security risks we discover could be mitigated.
引用
收藏
页码:36 / 43
页数:8
相关论文
共 50 条
  • [1] Integrating Bluetooth-Enabled Sensors with Cloud Computing for Fire Hazard Communication Systems
    Cui, Benben
    Wang, Chen
    Wu, Meng
    Zhu, Can
    Wang, Defa
    Li, Bin
    ASCE-ASME JOURNAL OF RISK AND UNCERTAINTY IN ENGINEERING SYSTEMS PART A-CIVIL ENGINEERING, 2024, 10 (03):
  • [2] Compliance monitoring via a Bluetooth-enabled retainer: A prospective clinical pilot study
    Castle, Eric
    Chung, Philip
    Behfar, Mohammad H.
    Chen, Matthew
    Gao, Jonathan
    Chiu, Nicholas
    Nelson, Gerald
    Roy, Shuvo
    Oberoi, Snehlata
    ORTHODONTICS & CRANIOFACIAL RESEARCH, 2019, 22 : 149 - 153
  • [3] Low-Power Bluetooth-Enabled Electrocardiogram (ECG) Devices: Design, Performance, and Applications
    Wang, Haili
    Zhang, Yixiang
    Zhang, Junqin
    Nian, Yongyao
    PROCEEDINGS OF 2023 4TH INTERNATIONAL SYMPOSIUM ON ARTIFICIAL INTELLIGENCE FOR MEDICINE SCIENCE, ISAIMS 2023, 2023, : 125 - 129
  • [4] Bluehoc-based simulation study of user data throughput in Bluetooth-enabled devices
    Rahat, Syed
    Anpalagan, Alagan
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2010, 5 (04) : 412 - 428
  • [5] RF Rendez-Blue: Reducing power and inquiry costs in Bluetooth-enabled mobile systems
    Hall, ES
    Vawdrey, DK
    Knutson, CD
    ELEVENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2002, : 640 - 645
  • [6] Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems
    Renganathan, Vishnu
    Yurtsever, Ekim
    Ahmed, Qadeer
    Yener, Aylin
    CYBERSECURITY, 2022, 5 (01)
  • [7] A PILOT STUDY TO DETERMINE EFFICACY OF BLUETOOTH-ENABLED HOME BLOOD PRESSURE MONITORING IN THE MANAGEMENT OF HYPERTENSION
    Paiva, Cody J.
    Clark, Brinton
    JOURNAL OF GENERAL INTERNAL MEDICINE, 2023, 38 : S105 - S106
  • [8] Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems
    Vishnu Renganathan
    Ekim Yurtsever
    Qadeer Ahmed
    Aylin Yener
    Cybersecurity, 5
  • [9] A Bluetooth-Enabled Device for Real-Time Detection of Sitting, Standing, and Walking: Cross-Sectional Validation Study
    Daryabeygi-Khotbehsara, Reza
    Rawstorn, Jonathan C.
    Dunstan, David W.
    Islam, Sheikh Mohammed Shariful
    Abdelrazek, Mohamed
    Kouzani, Abbas Z.
    Thummala, Poojith
    McVicar, Jenna
    Maddison, Ralph
    JMIR FORMATIVE RESEARCH, 2024, 8
  • [10] An empirical study on voice-enabled web applications
    Chang, Shuchih Ernest
    Heng, Michael S. H.
    IEEE PERVASIVE COMPUTING, 2006, 5 (03) : 76 - 81