[go: up one dir, main page]

Wu et al., 2020 - Google Patents

{BlueShield}: Detecting spoofing attacks in bluetooth low energy networks

Wu et al., 2020

View PDF
Document ID
13604554131086839426
Author
Wu J
Nan Y
Kumar V
Payer M
Xu D
Publication year
Publication venue
23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)

External Links

Snippet

Many IoT devices are equipped with Bluetooth Low Energy (BLE) to support communication in an energy-efficient manner. Unfortunately, BLE is prone to spoofing attacks where an attacker can impersonate a benign BLE device and feed malicious data to its users …
Continue reading at www.usenix.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Similar Documents

Publication Publication Date Title
Wu et al. {BlueShield}: Detecting spoofing attacks in bluetooth low energy networks
Fragkiadakis et al. A survey on security threats and detection techniques in cognitive radio networks
US8254847B2 (en) Distributed wireless communications for tactical network dominance
Kasinathan et al. An IDS framework for internet of things empowered by 6LoWPAN
Min et al. Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation
Labraoui et al. Secure DV‐Hop localization scheme against wormhole attacks in wireless sensor networks
Ramsey et al. Wireless intrusion detection and device fingerprinting through preamble manipulation
Gordon et al. A security assessment for consumer wifi drones
Yu et al. A framework for detecting MAC and IP spoofing attacks with network characteristics
Zhang et al. Signal emulation attack and defense for smart home IoT
Lovinger et al. Detection of wireless fake access points
WO2023219641A2 (en) Systems and methods for detecting microwave pulses
Shen et al. Electromagnetic fingerprinting of memory heartbeats: System and applications
Kitisriworapan et al. Client-side rogue access-point detection using a simple walking strategy and round-trip time analysis
Arnold et al. Catch you cause i can: busting rogue base stations using cellguard and the apple cell location database
US11330438B2 (en) Active base providing local man-in-the-middle firewall
O’Mahony et al. Identifying distinct features based on received samples for interference detection in wireless sensor network edge devices
Ghayyad et al. The flaws of Internet of Things (IoT) intrusion detection and prevention schemes
Chandrashekar et al. A primary user authentication system for mobile cognitive radio networks
Xu et al. Effective uav and ground sensor authentication
Vijayan et al. A conceptual framework of Zigbee wireless sensor networks for safety, reliability and security improvement
Cabaj et al. Sniffing detection within the network: Revisiting existing and proposing novel approaches
Hussein et al. Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks
Lalouani et al. Protocol Switching Mechanism for Countering Radiometric Signature Exploitation
Ramsey Improved wireless security through physical layer protocol manipulation and radio frequency fingerprinting