Transmission Modeling and Attack Simulation of Bluetooth Low Energy

Midhun Raj, K. Achuthan
{"title":"Transmission Modeling and Attack Simulation of Bluetooth Low Energy","authors":"Midhun Raj, K. Achuthan","doi":"10.1109/ICPS55917.2022.00025","DOIUrl":null,"url":null,"abstract":"Bluetooth low energy Attacks are common because of the widespread use of BLE devices in low power networks. Simulators and emulators are the traditional methods for testing and finding vulnerabilities in real-world technologies. The existing BLE Emulators are working based on packet transmission and performs BLE controller level attacks rather than the physical properties of the signal. This work helps simulate jamming attacks by using the BLE library that has been made as part of this work using the OpenModelica tool. A mathematical model is created using OpenModelica for testing BLE attacks. The BLE library can be used to simulate jamming and interference-related attacks by using the electromagnetic(EM) property of the wave. The effect of attack on transmission can be seen as graphical plots of power and EM fields based on the attack type..","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICPS55917.2022.00025","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Bluetooth low energy Attacks are common because of the widespread use of BLE devices in low power networks. Simulators and emulators are the traditional methods for testing and finding vulnerabilities in real-world technologies. The existing BLE Emulators are working based on packet transmission and performs BLE controller level attacks rather than the physical properties of the signal. This work helps simulate jamming attacks by using the BLE library that has been made as part of this work using the OpenModelica tool. A mathematical model is created using OpenModelica for testing BLE attacks. The BLE library can be used to simulate jamming and interference-related attacks by using the electromagnetic(EM) property of the wave. The effect of attack on transmission can be seen as graphical plots of power and EM fields based on the attack type..
低功耗蓝牙传输建模与攻击仿真
由于在低功耗网络中广泛使用BLE设备,蓝牙低功耗攻击很常见。模拟器和仿真器是测试和发现现实世界技术漏洞的传统方法。现有的BLE仿真器基于分组传输,执行BLE控制器级攻击,而不是信号的物理性质。这项工作通过使用BLE库来帮助模拟干扰攻击,BLE库是使用OpenModelica工具作为这项工作的一部分而制作的。使用OpenModelica创建了一个数学模型来测试BLE攻击。BLE库可以利用波的电磁(EM)特性来模拟干扰和与干扰相关的攻击。攻击对传输的影响可以看作是基于攻击类型的功率场和电磁场的图形图。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信