Securing Bluetooth Low Energy Enabled Industrial Monitors

被引:0
|
作者
del Arroyo, Jose Gutierrez [1 ]
Bindewald, Jason [2 ]
Ramsey, Benjamin [3 ]
机构
[1] Air Force Inst Technol, Dept Elect & Comp Engn, Wright Patterson AFB, OH 45433 USA
[2] Air Force Inst Technol, Dept Elect & Comp Engn, Comp Sci, Wright Patterson AFB, OH USA
[3] Air Force Inst Technol, Wright Patterson AFB, OH USA
关键词
bluetooth low energy; industrial monitors; wireless sensor networks; BLE security; BLE attack detection; BLE traffic sniffers; BLE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Bluetooth Low Energy (BLE) protocol is widely deployed on wireless devices in the consumer market, where applications benefit from its low energy consumption and low implementation overhead. BLE is also increasingly used in critical infrastructure applications, primarily in wireless sensor networks (WSN) for healthcare and environmental monitoring. While much research addresses the implementation and resiliency of these types of networks, little research focuses on detection of attacks on WSN sensors. To that extent, research that focuses on detection of attacks on BLE devices is lacking. Furthermore, BLE security research lags behind attack tool development. The general lack of security has led to recent development of two separate BLE man-in-the-middle frameworks, a privacy-violating BLE localization tool, and successful attacks on 12 commercially available BLE locks. To enable post-production updates, several vendors include the capability to alter device firmware over-the-air using BLE. Unfortunately, the standard service used for this purpose does not require authentication and has no built-in security. Consequently, a malicious actor can exploit the update mechanism to download malware to a target BLE device. This work contributes to the field of WSN and BLE security by illustrating an example attack methodology through a firmware exploit on a BLE industrial monitor. The attack vector is presented in its entirety, from target selection and enumeration to exploitation and malware deployment. Challenges in detection for this attack are presented from the perspective of a peripheral, end user, and third-party traffic sniffer. An experiment is designed to illustrate an additional challenge with sniffer-based detection, where some sniffers become less effective at capturing traffic over time. A mechanism for firmware recovery is proposed, emphasizing its difficulty for a normal end user, and further motivating the need for attack detection mechanisms. Finally, actionable steps are provided for vendors and end users to help defend BLE devices and enhance application security.
引用
收藏
页码:167 / 176
页数:10
相关论文
共 50 条
  • [1] BLUETOOTH LOW ENERGY FOR INDUSTRIAL AUTOMATION
    Grover, Manik
    Pardeshi, Suraj Kumar
    Singh, NirbhowJap
    Kumar, Sanjay
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 512 - 515
  • [2] Securing Bluetooth Low Energy networking: An overview of security procedures and threats
    Lacava, Andrea
    Zottola, Valerio
    Bonaldo, Alessio
    Cuomo, Francesca
    Basagni, Stefano
    [J]. COMPUTER NETWORKS, 2022, 211
  • [3] Design of a Bluetooth-enabled Low Energy Electrocardiogram Monitoring System
    Vue, Meng
    Ochwangi, Tom
    Thao, Meng
    Peng, Andy S.
    Baltaci, Kenan
    Zhan, Liang
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2017, : 223 - 228
  • [4] Networking Solutions for Connecting Bluetooth Low Energy Enabled Machines to the Internet of Things
    Nieminen, Johanna
    Gomez, Carles
    Isomaki, Markus
    Savolainen, Teemu
    Patil, Basavaraj
    Shelby, Zach
    Xi, Minjun
    Oller, Joaquim
    [J]. IEEE NETWORK, 2014, 28 (06): : 83 - 90
  • [5] On the Security of Bluetooth Low Energy in Two Consumer Wearable Heart Rate Monitors/Sensing Devices
    Kurt Peker, Yesem
    Bello, Gabriel
    Perez, Alfredo J.
    [J]. SENSORS, 2022, 22 (03)
  • [6] A Bluetooth Low Energy (BLE)-enabled Wireless Link for Bidirectional Communications with a Neural Microsystem
    Vitale, Nicholas H.
    Azin, Meysam
    Mohseni, Pedram
    [J]. 2018 IEEE BIOMEDICAL CIRCUITS AND SYSTEMS CONFERENCE (BIOCAS): ADVANCED SYSTEMS FOR ENHANCING HUMAN HEALTH, 2018, : 371 - 374
  • [7] Self-Optimizing Bluetooth Low Energy Networks for Industrial IoT Applications
    Fatihah, Siti Nur
    Dewa, Gilang Raka Rayuda
    Park, Cheolsoo
    Sohn, Illsoo
    [J]. IEEE COMMUNICATIONS LETTERS, 2023, 27 (01) : 386 - 390
  • [8] Bluetooth low energy indoor localization for large industrial areas and limited infrastructure
    Szyc, Kamil
    Nikodem, Maciej
    Zdunek, Michal
    [J]. AD HOC NETWORKS, 2023, 139
  • [9] Low-overhead Hardware Supervision for Securing an IoT Bluetooth-enabled Device: Monitoring Radio Frequency and Supply Voltage
    Elkanishy, Abdelrahman
    Furth, Paul M.
    Rivera, Derrick T.
    Badawy, Abdel-Hameed A.
    [J]. ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2022, 18 (01)
  • [10] Low Latency Audio Coder Design for Bluetooth and Bluetooth Low Energy
    Moon, Hangil
    Lee, Namsuk
    Kim, Hyunwook
    Lee, Sanghoon
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2015, : 138 - 141