Mobile 253 Views

by Ikhee Shin on 2016-12-16 16:04:01

Date : 2016.12.19(Mon) 10:00 A.M.

Locate : EB5. 533

Presenter : Ikhee Shin

Title : Protecting Privacy of BLE Device Users

Author : Kassem Fawaz, Kyu-Han Kim, Kang G. Shin

Abstract

Bluetooth Low Energy (BLE) has emerged as an attractive technology to enable Internet of Things (IoTs) to interact with others in their vicinity. Our study of the behavior of more than 200 types of BLE-equipped devices has led to a surprising discovery: the BLE protocol, despite its privacy provisions, fails to address the most basic threat of all—hiding the device’s presence from curious adversaries. Revealing the device’s existence is the stepping stone toward more serious threats that include user profiling/fingerprinting, behavior tracking, inference of sensitive information, and exploitation of known vulnerabilities on the device. With thousands of manufacturers and developers around the world, it is very challenging, if not impossible, to envision the viability of any privacy or security solution that requires changes to the devices or the BLE protocol.

In this paper, we propose a new device-agnostic system, called BLE-Guardian, that protects the privacy of the users/environments equipped with BLE devices/IoTs. It enables the users and administrators to control those who discover, scan and connect to their devices. We have implemented BLE-Guardian using Ubertooth One, an off-the-shelf open Bluetooth development platform, facilitating its broad deployment. Our evaluation with real devices shows that BLE-Guardian effectively protects the users’ privacy while incurring little overhead on the communicating BLE-devices.

Proceeding : 

25th USENIX Security Symposium (USENIX Security 16), 8 (2016)
Pages 1205-1221

Article source: http://eslab.cnu.ac.kr/en/Mobile/88-Protecting-Privacy-of-BLE-Device-Users.html

Other

General