Skip to main content

Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 977))

Abstract

We present a novel solution in tracking the behaviour of an attacker and limiting their ability to compromise a cybersecurity system. The solution is based on combining a decoy with a real system, in which a BLE controller will be embedded in the middle of the system, thereby acting like a fob that opens and closes the access of the server’s BLE. If the first server wants to communicate with the second server, the BLE must be activated by the BLE controller in order for both servers to communicate with one another. This is a relatively low-cost solution and our aim is to lower the interruption to the live system, capture the attacker’s position, and limit the damages the attacker can do to a live system. A second related goal is to lower the attacker’s opportunity to detect that they are being monitored. A third goal is to gather evidence of the attacker’s actions that can be used for further investigation. This work is significant in that it is implemented within a real physical system for testing and evaluation using Raspberry PI and Arduino boards to replicate servers that communicate wirelessly. Adding a specifically-designed Encryption Block Cycle Cipher can protect legitimate users and redirect attackers to a honeypot system. Several custom programs were written from scratch to monitor the attacker’s behaviour and Bluetooth Low Energy is enlisted to verify users. When the device was disassembled, all of the Raspberry PI, which run the Linux servers, were discontinued and unable to communicate with other devices.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Brown, A., Andel, T.: What’s in your honeypot? In: The 11th International Conference on Cyber Warfare and Security, Boston, USA, pp. 370–377 (2016)

    Google Scholar 

  2. Cho, K., et al.: Analysis of latency performance of Bluetooth Energy (BLE) networks. Nat. Cent. Biotechnol. Inform. 15(1), 59–78 (2015)

    Google Scholar 

  3. Fawaz, K.: Protecting privacy of BLE device users. In: The 25th USNIX Security Symposium, Austin, USA, pp. 1205–1221 (2016)

    Google Scholar 

  4. Gogic, A., Mujcic, A., Ibric, S., Suljanovic, N.: Performance analysis of Bluetooth low energy mesh routing algorithms in case of disaster prediction. Int. J. Comput. Electr. Autom. Control Inform. Eng. 10(6), 929–935 (2016). World Academy of Science, Engineering and Technology

    Google Scholar 

  5. Hiller, J., Russell, R.: Modalities for cyber security and privacy resilience: the NIST approach. Int. J. Disaster Risk Reduct. 10, 213–215 (2015)

    Google Scholar 

  6. Hunter, A., Wong, K.: Decoy systems with low energy Bluetooth communication. In: Proceedings of the 4th International Conference on Information Security and Privacy (ICISSP), Madeira, Portugal, pp. 404–409 (2018)

    Google Scholar 

  7. Lazar, D., Chen, H., Wang, X., Zeldovich, N.: Why does crypto-graphic software fail? A case study and open problems. In: The 5th Asia-Pacific Workshop on Systems, New York, USA, pp. 1–7 (2014)

    Google Scholar 

  8. Nam, J., Choo, K-K.R., Paik, J., Won, D.: Two-round password-only authenticated key exchange in the three party setting. In: Multidisciplinary Digital Publishing Institute (MDPI), pp. 393–396 (2014)

    Google Scholar 

  9. Rutherford, J., White, G.: Using as improved cybersecurity kill chain to develop an improved honey community. In: 49th Hawaii International Conference on System Science, pp. 2624–2632 (2016)

    Google Scholar 

  10. Kapoor, V., Yadav, R.: A hybrid cryptography technique to support cyber security infrastructure. Int. J. Adv. Res. Comput. Eng. Technol. 4(11), 3995–4002 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aaron Hunter .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wong, K.C.K., Hunter, A. (2019). Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study. In: Mori, P., Furnell, S., Camp, O. (eds) Information Systems Security and Privacy. ICISSP 2018. Communications in Computer and Information Science, vol 977. Springer, Cham. https://doi.org/10.1007/978-3-030-25109-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-25109-3_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-25108-6

  • Online ISBN: 978-3-030-25109-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics