Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems

Occupancy detection of a building has a wide range of applications. Areas such as emergency management, home automation and building energy management can benefit from the knowledge of occupants' locations to provide better results and improve their efficiency. Bluetooth Low Energy (BLE) beacons installed inside a building are able to provide information on an occupant's location. Since, however, their operation is based on broadcasting advertisements, they are vulnerable to network security breaches. In this work, we evaluate the effect of two types of spoofing attacks on a BLE based occupancy detection system. The system is composed of BLE beacons installed inside the building, a mobile application installed on occupants mobile phones and a remote control server. Occupancy detection is performed by a classifier installed on the remote server. We use our real-world experimental results to evaluate the impact of these attacks on the system's operation, particularly in terms of the accuracy with which it can provide location information.

[1]  Dirk Timmermann,et al.  Secure privacy preserving information beacons for public transportation systems , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[2]  Erol Gelenbe,et al.  Distributed Building Evacuation Simulator for Smart Emergency Management , 2010, Comput. J..

[3]  Scott F. Midkiff,et al.  An analysis of Bluetooth security vulnerabilities , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[4]  Shivakumar S. Bagi,et al.  A system and method for transmission of traffic sign board information to vehicles and relevance determination , 2014, 2014 International Conference on Advances in Electronics Computers and Communications.

[5]  Stelios Timotheou,et al.  Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios , 2009, SAC '09.

[6]  George Loukas,et al.  Bluetooth Low Energy Based Occupancy Detection for Emergency Management , 2016, 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace and Security (IUCC-CSS).

[7]  Pekka Toivanen,et al.  Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures , 2013 .

[8]  Wei Zhou,et al.  A proposal of interaction system between visitor and collection in museum hall by iBeacon , 2015, 2015 10th International Conference on Computer Science & Education (ICCSE).

[9]  George Loukas,et al.  Occupancy Detection for Building Emergency Management Using BLE Beacons , 2016, ISCIS.

[10]  Dae-Jea Cho,et al.  Design and Implementation of Automatic Attendance Check System Using BLE Beacon , 2015, MUE 2015.

[11]  Choon-Sung Nam,et al.  BLE-OTP Authorization Mechanism for iBeacon Network Security , 2015 .

[12]  Il-Woo Lee,et al.  Smart office energy management system using bluetooth low energy based beacons and a mobile app , 2015, 2015 IEEE International Conference on Consumer Electronics (ICCE).

[13]  Joseph Kee-Yin Ng,et al.  Activity tracking and monitoring of patients with alzheimer’s disease , 2015, Multimedia Tools and Applications.

[14]  Konstantin Hyppönen,et al.  Bluetooth Security Attacks , 2013, SpringerBriefs in Computer Science.

[15]  Sungil Kim,et al.  Indoor positioning system techniques and security , 2015, 2015 Forth International Conference on e-Technologies and Networks for Development (ICeND).

[16]  Erol Gelenbe,et al.  Spatial Computers for Emergency Support , 2013, Comput. J..

[17]  Prasant Misra,et al.  Security Challenges in Indoor Location Sensing using Bluetooth LE Broadcast , 2015 .