Implementation and Analysis of Covert Channel Using iBeacon
Ye-Sol Oh, Yeon-Ji Lee, Jiwon Jang, Hyunwoo Choi, Il-Gu Lee
2024
Abstract
Covert channels are typically employed to transmit information and bypass security policies and controls simultaneously to maintain undetected communication. Various techniques have been proposed for establishing covert channels, including those at the network level, and for using different components. This study investigated the security implications of Apple’s iBeacon broadcast messages by focusing on the establishment of covert channels. We introduce two Bluetooth Low Energy (BLE) covert channels: one using broadcast payloads and the other employing broadcasting intervals. These channels can be used in a complementary manner, balancing covertness and bandwidth. In our evaluation, the payload-based covert channel achieved a maximum throughput of 911,600 Bytes per second (Bps) with a Packet Delivery Rate (PDR) exceeding 75%, demonstrating its capability to transmit substantial data via iBeacon covertly. This study focuses on enhancing the security of BLE Beacon deployment.
DownloadPaper Citation
in Harvard Style
Oh Y., Lee Y., Jang J., Choi H. and Lee I. (2024). Implementation and Analysis of Covert Channel Using iBeacon. In Proceedings of the 10th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP; ISBN 978-989-758-683-5, SciTePress, pages 861-868. DOI: 10.5220/0012457800003648
in Bibtex Style
@conference{icissp24,
author={Ye-Sol Oh and Yeon-Ji Lee and Jiwon Jang and Hyunwoo Choi and Il-Gu Lee},
title={Implementation and Analysis of Covert Channel Using iBeacon},
booktitle={Proceedings of the 10th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP},
year={2024},
pages={861-868},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012457800003648},
isbn={978-989-758-683-5},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 10th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP
TI - Implementation and Analysis of Covert Channel Using iBeacon
SN - 978-989-758-683-5
AU - Oh Y.
AU - Lee Y.
AU - Jang J.
AU - Choi H.
AU - Lee I.
PY - 2024
SP - 861
EP - 868
DO - 10.5220/0012457800003648
PB - SciTePress