As the foremost protocol for low-power communication, Bluetooth Low Energy (BLE) significantly impacts various aspects of our lives, including industry and healthcare. Given BLE’s inherent security limitations and firmware vulnerabilities, spoofing attacks can readily compromise BLE devices and jeopardize privacy data. In this paper, we introduce BLEGuard, a hybrid mechanism for detecting spoofing attacks in BLE networks. We established a physical Bluetooth system to conduct attack simulations and construct a substantial dataset (BLE-SAD). BLEGuard integrates pre-detection, reconstruction, and classification models to effectively identify spoofing activities, achieving an impressive preliminary accuracy of 99.02%, with a false alarm rate of 2.04% and an undetection rate of 0.37%.
Our Github repo contain the following code and data:
.
├─dataset # sample set of our dataset.
│ ├─profiles # sample data of BLE device.
│ └─BLE-SAD # large-scale BLE network packets.
│ └─Android_tool_app # Android app for automatic data collection.
├─src
│ ├─blemonitor # BLE device monitoring program.
│ ├─machine-learning # relative code for our learning model.
│ └─ubertooth # fixed ubertooth code for additional attribution.
├─static # static resource.
└─README # the document you are reading now.
└─BLEGuard_poster.pptx # poster for BLEGuard and BLE-SAD.
You can find the projects we've referenced in the machine learning section at this link.
This project is licensed under the MIT license. See the LICENSE file for details.
This project was supported by the Chinese National Undergraduate Innovation Training Program (No. 202310386056) and the AAAI 2024 Undergraduate Consortium Scholarship. We extend our sincere gratitude to Dr. Tozammel Hossain, Dr. Jason Grant, Dr. Patricia Ordóñez, and Ms. Linshi Li for their insightful suggestions.
@techreport{cai2024bleguard,
title={BLEGuard: Hybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy Networks},
author={Cai, Hanlin and Fang, Yuchen and Huang, Jiacheng and Yuan, Meng and Xu, Zhezhuang},
year={2024},
institution={EasyChair}
}