{"title":"Transmission Modeling and Attack Simulation of Bluetooth Low Energy","authors":"Midhun Raj, K. Achuthan","doi":"10.1109/ICPS55917.2022.00025","DOIUrl":null,"url":null,"abstract":"Bluetooth low energy Attacks are common because of the widespread use of BLE devices in low power networks. Simulators and emulators are the traditional methods for testing and finding vulnerabilities in real-world technologies. The existing BLE Emulators are working based on packet transmission and performs BLE controller level attacks rather than the physical properties of the signal. This work helps simulate jamming attacks by using the BLE library that has been made as part of this work using the OpenModelica tool. A mathematical model is created using OpenModelica for testing BLE attacks. The BLE library can be used to simulate jamming and interference-related attacks by using the electromagnetic(EM) property of the wave. The effect of attack on transmission can be seen as graphical plots of power and EM fields based on the attack type..","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICPS55917.2022.00025","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Bluetooth low energy Attacks are common because of the widespread use of BLE devices in low power networks. Simulators and emulators are the traditional methods for testing and finding vulnerabilities in real-world technologies. The existing BLE Emulators are working based on packet transmission and performs BLE controller level attacks rather than the physical properties of the signal. This work helps simulate jamming attacks by using the BLE library that has been made as part of this work using the OpenModelica tool. A mathematical model is created using OpenModelica for testing BLE attacks. The BLE library can be used to simulate jamming and interference-related attacks by using the electromagnetic(EM) property of the wave. The effect of attack on transmission can be seen as graphical plots of power and EM fields based on the attack type..