an active sniffer to capture normal and attack traffic,
using the InternalBlue framework and a Broadcom
BCM4339 Bluetooth Controller. Finally, we used the
collected data to train various machine-learning mod-
els to classify attack data and achieved good perfor-
mance with the Random Forest model. Our inexpen-
sive and simple detection setup can also be extended
to notify various stakeholders, such as caretakers and
family members as soon as an attack is detected, thus
ensuring the safety and welfare of the senior resi-
dents in a smart home. In the future, we intend to
enhance our current low-cost setup to capture addi-
tional features such as RF signal strength, RF sig-
nal frequency offset, bit error rate, invalid data rate,
and more to model and identify a broader range of
Bluetooth attacks. Further, we also plan to integrate
Ubertooth One, to extend the existing setup to detect
SweynTooth-based (Garbelini et al., 2020) attacks on
BLE devices.
ACKNOWLEDGEMENTS
This project was supported in part by collaborative
research funding from the National Research Council
of Canada’s Aging in Place Program.
REFERENCES
Antonioli, D., Tippenhauer, N. O., and Rasmussen, K. B.
(2019). The knob is broken: Exploiting low entropy
in the encryption key negotiation of bluetooth br/edr.
In USENIX Security Symposium, pages 1047–1061.
BrakToothPoC (2021). Braktooth proof of con-
cept. https://github.com/Matheus-Garbelini/
braktooth esp32 bluetooth classic attacks.
Cominelli, M., Gringoli, F., Patras, P., Lind, M., and Noubir,
G. (2020). Even black cats cannot stay hidden in the
dark: Full-band de-anonymization of bluetooth classic
devices. In 2020 IEEE Symposium on Security and
Privacy (SP), pages 534–548.
Ditton, S., Tekeoglu, A., Bekiroglu, K., and Srinivasan, S.
(2020). A proof of concept denial of service attack
against bluetooth iot devices. In 2020 IEEE Interna-
tional Conference on Pervasive Computing and Com-
munications Workshops (PerCom Workshops), pages
1–6. IEEE.
El Jaouhari, S. and Bouvet, E. (2022). Secure firmware
over-the-air updates for iot: Survey, challenges, and
discussions. Internet of Things, 18:100508.
Ferro, E. and Potorti, F. (2005). Bluetooth and wi-fi wireless
protocols: a survey and a comparison. IEEE Wireless
Communications, 12(1):12–26.
Garbelini, M. E., Chattopadhyay, S., Bedi, V., Sun, S., and
Kurniawan, E. (2021). Braktooth: Causing havoc on
bluetooth link manager.
Garbelini, M. E., Wang, C., Chattopadhyay, S., Sun, S., and
Kurniawan, E. (2020). Sweyntooth: Unleashing may-
hem over bluetooth low energy. In Proceedings of the
2020 USENIX Conference on Usenix Annual Techni-
cal Conference, pages 911–925.
Gholamy, A., Kreinovich, V., and Kosheleva, O. (2018).
Why 70/30 or 80/20 relation between training and
testing sets: A pedagogical explanation.
Huang, Y., Hong, P., and Yu, B. (2018). Design of bluetooth
dos attacks detection and defense mechanism. In 2018
IEEE 4th International Conference on Computer and
Communications (ICCC), pages 1382–1387. IEEE.
Mantz, D., Classen, J., Schulz, M., and Hollick, M. (2019).
Internalblue-bluetooth binary patching and experi-
mentation framework. In Proceedings of the 17th An-
nual International Conference on Mobile Systems, Ap-
plications, and Services, pages 79–90.
Nijholt, T., Poll, E., and Vaandrager, F. (2020). Bluespec:
Development of an lmp state machine and a stateful
black-box br/edr lmp fuzzer.
NordicSemiconductor (2018). Device firmware up-
date process. https://infocenter.nordicsemi.
com/topic/com.nordic-.infocenter.sdk5.v15.0.0/
lib bootloader dfu process.html.
nRFSniffer (2023). Nrf sniffer for bluetooth
le. https://www.nordicsemi.com/Products/
Development-tools/nrf-sniffer-for-bluetooth-le.
OConnor, T. and Reeves, D. (2008). Bluetooth network-
based misuse detection. In 2008 Annual Computer Se-
curity Applications Conference (ACSAC), pages 377–
391. IEEE.
Ossmann, M. (2011). Ubertooth one. https://github.com/
greatscottgadgets/ubertooth.
Satam, P., Satam, S., and Hariri, S. (2018). Bluetooth in-
trusion detection system (bids). In 2018 IEEE/ACS
15th International Conference on Computer Systems
and Applications (AICCSA), pages 1–7.
Schulz, M., Wegemer, D., and Hollick, M. (2015). Nex-
mon: A cookbook for firmware modifications on
smartphones to enable monitor mode. arXiv preprint
arXiv:1601.07077.
SIG, B. (2023). Bluetooth market update. https://www.
bluetooth.com/2023-market-update/.
Wagner, F., Basran, J., and Dal Bello-Haas, V. (2012).
A review of monitoring technology for use with
older adults. Journal of geriatric physical therapy,
35(1):28–34.
Wu, J., Nan, Y., Kumar, V., Payer, M., and Xu, D. (2020).
Blueshield: Detecting spoofing attacks in bluetooth
low energy networks. In RAID, pages 397–411.
SECRYPT 2023 - 20th International Conference on Security and Cryptography
792