loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Ye-Sol Oh 1 ; Yeon-Ji Lee 1 ; Jiwon Jang 1 ; Hyunwoo Choi 2 and Il-Gu Lee 3

Affiliations: 1 Department of Future Convergence Technology Engineering, Sungshin Women’s University, Seoul, 02844, South Korea ; 2 Korea Advanced Institute of Science and Technology, Daejeon, South Korea ; 3 Department of Convergence Security Engineering, Sungshin Women’s University, Seoul, 02844, South Korea

Keyword(s): Covert Channel, BLE, iBeacon, iBeacon Payload, Advertising Interval.

Abstract: Covert channels are typically employed to transmit information and bypass security policies and controls simultaneously to maintain undetected communication. Various techniques have been proposed for establishing covert channels, including those at the network level, and for using different components. This study investigated the security implications of Apple’s iBeacon broadcast messages by focusing on the establishment of covert channels. We introduce two Bluetooth Low Energy (BLE) covert channels: one using broadcast payloads and the other employing broadcasting intervals. These channels can be used in a complementary manner, balancing covertness and bandwidth. In our evaluation, the payload-based covert channel achieved a maximum throughput of 911,600 Bytes per second (Bps) with a Packet Delivery Rate (PDR) exceeding 75%, demonstrating its capability to transmit substantial data via iBeacon covertly. This study focuses on enhancing the security of BLE Beacon deployment.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 2a06:98c0:3600::103

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Oh, Y., Lee, Y., Jang, J., Choi, H. and Lee, I. (2024). Implementation and Analysis of Covert Channel Using iBeacon. In Proceedings of the 10th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-683-5; ISSN 2184-4356, SciTePress, pages 861-868. DOI: 10.5220/0012457800003648

@conference{icissp24,
author={Ye{-}Sol Oh and Yeon{-}Ji Lee and Jiwon Jang and Hyunwoo Choi and Il{-}Gu Lee},
title={Implementation and Analysis of Covert Channel Using iBeacon},
booktitle={Proceedings of the 10th International Conference on Information Systems Security and Privacy - ICISSP},
year={2024},
pages={861-868},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012457800003648},
isbn={978-989-758-683-5},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 10th International Conference on Information Systems Security and Privacy - ICISSP
TI - Implementation and Analysis of Covert Channel Using iBeacon
SN - 978-989-758-683-5
IS - 2184-4356
AU - Oh, Y.
AU - Lee, Y.
AU - Jang, J.
AU - Choi, H.
AU - Lee, I.
PY - 2024
SP - 861
EP - 868
DO - 10.5220/0012457800003648
PB - SciTePress