Bluetooth Low Energy (BLE) has become one of the most popular wireless communication protocols and is used in billions of smart devices. Despite several security features, the hardware and software limitations of these devices makes them vulnerable to man-in-the-middle (MITM) attacks. Due to the use of these devices in increasingly diverse and safety-critical applications, the capability to detect MITM attacks has become more critical. To address this challenge, we propose the use of the response time behavior of a BLE device observed in relation to select read and write operations and introduce an activeMITM attack detection system that identifies changes in response time. Our measurements on several BLE devices show that theirresponse time behavior exhibits very high regularity, making it a very reliable attack indicator that cannot be concealed by an attacker. Test results show that our system can very accurately and quickly detect MITM attacks while requiring a simple learning approach.
翻译:蓝牙低能(Blue House)已成为最受欢迎的无线通信协议之一,并被用于数十亿个智能设备。尽管这些设备具有若干安全特征,但硬件和软件的限制使得这些设备易受中层人(MITM)袭击。由于这些设备在日益多样化和安全关键应用中被使用,检测MITM袭击的能力变得更为关键。为了应对这一挑战,我们提议使用在选择读写操作方面观察到的破伤风装置的反应时间行为,并引入一个主动的MITM攻击探测系统,确定反应时间的变化。我们对若干破伤风装置的测量显示,它们的反应时间行为非常频繁,成为攻击者无法隐藏的非常可靠的攻击指标。测试结果表明,我们的系统可以非常准确和迅速地检测MITM袭击,同时需要简单的学习方法。