Securing Billion Bluetooth Devices Leveraging Learning-Based Techniques
Abstract
As the most popular low-power communication protocol, cybersecurity research on Bluetooth Low Energy (BLE) has garnered significant attention. Due to BLE’s inherent security limitations and firmware vulnerabilities, spoofing attacks can easily compromise BLE devices and tamper with privacy data. In this paper, we proposed BLEGuard, a hybrid detection mechanism combined cyber-physical features with learning-based techniques. We established a physical network testbed to conduct attack simulations and capture advertising packets. Four different network features were utilized to implement detection and classification algorithms. Preliminary results have verified the feasibility of our proposed methods.
Cite
Text
Cai. "Securing Billion Bluetooth Devices Leveraging Learning-Based Techniques." AAAI Conference on Artificial Intelligence, 2024. doi:10.1609/AAAI.V38I21.30544Markdown
[Cai. "Securing Billion Bluetooth Devices Leveraging Learning-Based Techniques." AAAI Conference on Artificial Intelligence, 2024.](https://mlanthology.org/aaai/2024/cai2024aaai-securing/) doi:10.1609/AAAI.V38I21.30544BibTeX
@inproceedings{cai2024aaai-securing,
title = {{Securing Billion Bluetooth Devices Leveraging Learning-Based Techniques}},
author = {Cai, Hanlin},
booktitle = {AAAI Conference on Artificial Intelligence},
year = {2024},
pages = {23731-23732},
doi = {10.1609/AAAI.V38I21.30544},
url = {https://mlanthology.org/aaai/2024/cai2024aaai-securing/}
}