and reconsider, if it turns out that the attacker had
some reason to know about the log files transfer. A
clever attacker could actually deceive the system by
performing actions that they want logged.
In any event, this formalization would allow us to
state formal properties about the system, and then for-
mally prove them under flexible assumptions about
the attackers behaviour. This formal analysis will take
our system from a practical demonstration to a prov-
ably secure architecture. We leave this formal aspect
for future work.
6 CONCLUSION
The paper describes an approach to setting up a de-
coy system where the actions of an attacker are logged
and transmitted to a monitoring system using BLE de-
vices. The results showed that this could be done ef-
fectively, provided that the decoy system is in close
physical proximity to the monitoring system. Sig-
nificantly, the signal used to communicate could not
be detected at a distannce beyond 10 meters. This is
an advantage for physical systems, as it means an at-
tacker is less likely to know that they are being mon-
itored. While we acknowledge that an attacker might
be able to use non-physical means to determine they
are being monitored, the physical undetectability of
our signal does make it less likely that our decoy sys-
tem will be discovered. In the discussion, we briefly
discussed how notions of undetectability and igno-
rance may be formalized to provide proofs of security
at a theoretical level.
Based on the results of the present research, future
work will enlist stronger filters such as adding addi-
tional authentication keys between each of the BLE
devices that can strengthen security in the system. For
instance, setting up an authentication key combina-
tion code that is required to be validated before en-
tering the BLE master controller , which is between
the Raspberry PI Linux servers. Not only will this
strengthen the security of the system, but it will also
prevent the attacker from being able to control the Ar-
duino electronic board, which is the master Bluetooth
key controller. Once the attacker compromise the Ar-
duino electronic board, they can have full accessibil-
ity to control the Bluetooth Low Energy devices and
that will allow the attacker to control the main system
too.
REFERENCES
Ahanger, T. A. (2014). Port scan a security concern. Inter-
national Journal of Engineering and Innovation Tech-
nology, 3(10):241–246.
Brown, A. and Andel, T. (2016). What’s in your honeypot?
In Proceedings of the 11th International Conference
on Cyber Warfare and Security, pages 370–377.
Burrows, M., Abadi, M., and Needham, R. (1990). A logic
of authentication. ACM Transactions on Computer
Systems, 8(1):18–36.
Cremers, C. (2008). The Scyther Tool: Verification, falsifi-
cation, and analysis of security protocols. In Com-
puter Aided Verification, 20th International Confer-
ence, pages 1–30.
Enderton, H. (2001). A mathematical introduction to logic.
Harcourt/Academic Press, 2nd ed edition.
Fagin, R., Halpern, J., Moses, Y., and Vardi, M. (2003).
Reasoning About Knowledge. MIT Press.
Fawaz, K., Kim, K., and Shin, K. (2016). Protecting pri-
vacy of BLE device users. In Proceedings of the 25th
USENIX Security Symposium, pages 1205–1221.
Gogic, A., Mujcic, A., Ibric, S., and Suljanovic, N. (2016).
Performance analysis of bluetooth low energy mesh
routing algorithms in case of distaster prediction.
World Academy of Science, Engineering and Technol-
ogy, 10(6):1–7.
Hunter, A., Delgrande, J., and McBride, R. (2013). Protocol
verification in a theory of action. In Proceedings of the
Canadian Conference on AI, pages 52–63.
Kaur, R. and Gurjot, S. (2014). Analysing port scanning
tools and security techniques. International Journal
of Electrical Electronics and Computer Science Engi-
neering, 1(5):58–64.
Khan, S. and Gupta, R. (2013). Future aspects of firewall in
internet security. IEC International Journal of Tech-
nology and Management, 1(1):30–36.
Kriz, P., Maly, F., and Kozel, T. (2016). Improving indoor
localization using bluetooth low energy beacons. Mo-
bile Information Systems, 62:1–11.
Lazar, D., Chen, H., Wang, X., and Zeldovich, N. (2013).
Why does cryptographic software fail? A case study
and open problems. In Proceedings of the 5th Asia-
Pacific Workshop on Systems, pages 1–7.
Michalevsky, Y., Nath, S., and Liu, J. (2016). Mash-
able: Mobile application of secret handshakes over
bluetooth. In Proceedings of the ACM Annual Inter-
national Conference on Mobile Computing and Net-
working, pages 1–14.
Padda, S., Gupta, S., Apoorva, G., Lofty, S., and Kaur, A.
(2016). Honeypot: A security tool in intrusion detec-
tion. International Journal of Advanced Engineering,
Management and Science, 2(5):311–316.
Rowe, N. and Rrushi, J. (2016). Introduction to Cyber De-
ception. Springer, 1st ed edition.
Rutherford, J. and White, G. (2016). Using as improved cy-
bersecurity kill chain to develop an improved honey
community. IEEE Computer Society, pages 2624–
2632.
Decoy Systems with Low Energy Bluetooth Communication
409