Download PDFOpen PDF in browserHybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy NetworksEasyChair Preprint 10902, version 22 pages•Date: April 14, 2024AbstractAs the foremost protocol for low-power communication, Bluetooth Low Energy (BLE) significantly impacts various aspects of our lives, including industry and healthcare. Given BLE’s inherent security limitations and firmware vulnerabilities, spoofing attacks can readily compromise BLE devices and jeopardize privacy data. In this paper, we introduce BLEGuard, a hybrid mechanism for detecting spoofing attacks in BLE networks. We established a physical Bluetooth system to conduct attack simulations and construct a substantial dataset (BLE-SAD). BLEGuard integrates pre-detection, reconstruction, and classification models to effectively identify spoofing activities, achieving an impressive preliminary accuracy of 99.01%, with a false alarm rate of 2.05% and an undetection rate of 0.36%. Keyphrases: Bluetooth Low Energy, Cybersecurity, classification model, reconstruction model, spoofing attack
|