Abstract Bluetooth Low Energy is a wireless communications protocol that is increasingly used in critical infrastructure applications, especially for inter-sensor communications in wireless sensor networks. Recent security research notes a trend in which developers and vendors have opted out of implementing Bluetooth Low Energy link security in many devices, enabling protocol attacks and attack frameworks. To help defend devices with no link security, researchers recommend the use of Bluetooth Low Energy traffic sniffers to generate auditable communications logs. Unfortunately, current sniffers can only follow a single connection at a time, and some are ineffective at capturing long-lived connections due to synchronization problems. These limitations make current sniffers impractical for use in wireless sensor networks. This paper presents Bluetooth Low Energy Multi (BLE-Multi), a firmware enhancement to the open-source Ubertooth One that enables the sniffing of multiple simultaneous long-lived connections. To increase the capture effectiveness for long-lived connections, a novel synchronization mechanism is proposed that uses transmissions of empty packets to infer information about connection timing. Multi-connection sniffing is achieved by opportunistically switching between connections as they move from the active to inactive state, which is an inherent function in Bluetooth Low Energy to help conserve energy. The experimental evaluations demonstrate that BLE-Multi simultaneously captures multiple active connections while outperforming Ubertooth One when it captures a single connection, paving the way for the development and implementation of automated defensive tools for Bluetooth Low Energy and wireless sensor networks.
[1]
Ju Wook Jang,et al.
BLEmesh: A Wireless Mesh Network Protocol for Bluetooth Low Energy Devices
,
2015,
2015 3rd International Conference on Future Internet of Things and Cloud.
[2]
Kenichi Soga,et al.
Development of Wireless Sensor Network using Bluetooth Low Energy (BLE) for Construction Noise Monitoring
,
2015
.
[3]
Mike Ryan,et al.
Bluetooth: With Low Energy Comes Low Security
,
2013,
WOOT.
[4]
Aljo Mujcic,et al.
Performance Analysis of Bluetooth Low Energy Mesh Routing Algorithm in Case of Disaster Prediction
,
2016
.
[5]
Kang G. Shin,et al.
Protecting Privacy of BLE Device Users
,
2016,
USENIX Security Symposium.
[6]
Ian G. Harris,et al.
An on-demand scatternet formation and multi-hop routing protocol for BLE-based wireless sensor networks
,
2015,
2015 IEEE Wireless Communications and Networking Conference (WCNC).
[7]
Yang Xiao,et al.
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
,
2007,
IEEE Wireless Communications.