The goal of this work was to better understand the state of security in Bluetooth Low Energy (BLE) Internet of Things (IoT) devices. This was accomplished by creating malicious code and testing a few known attacks. Code was created to attempt a denial of service (DoS) attack on an IoT gateway, and malware was developed to exfiltrate data. The malware was designed for two functions. First, it read data being sent to the gateway via a BLE IoT sensor. Afterwards, it choose whether or not to exfiltrate it based on a user defined parameter. A detector was also built to measure the malware's effectiveness in stealthy operation. The effectiveness of the detector was then compared against the percentage of exfiltrated data. The results of the DoS attacks showed difficulty in successfully performing them, whereas the results for the exfiltration malware show that at low percentages of data exfiltration, detection is difficult. After a small amount of exfiltration (about 4%) however, detection accuracy dramatically increases by almost 40%. This is likely due to how easy it is to detect anomalous behavior when a benign system is relatively quiet or consistent in operations.
Metrics
49 File views/ downloads
63 Record Views
Details
Title
Security of Bluetooth Low Energy Internet of Things Devices
Creators
Zachary Thornton
Contributors
Steven P. Weber (Advisor)
Spiros Mancoridis (Advisor)
Awarding Institution
Drexel University
Degree Awarded
Master of Science (M.S.)
Publisher
Drexel University; Philadelphia, Pennsylvania
Number of pages
xii, 56 pages
Resource Type
Thesis
Language
English
Academic Unit
College of Engineering (1970-2026); Electrical (and Computer) Engineering [Historical]; Drexel University