
market-set-nearly-quadruple-2024-smart-home-
exceeds-800-million-device-shipments/.
Ameri, A. and Johnson, D. (2017). Covert channel over
network time protocol. In Proceedings of the 2017
International Conference on Cryptography, Security
and Privacy, pages 62–65.
Bluetooth, S. (2016). Proprietary : Bluetooth core specifi-
cation v5.0.
bluez Homepage (2016). http://www.bluez.org/about/.
Claeys, T., Rousseau, F., Simunovic, B., and Tourancheau,
B. (2019). Thermal covert channel in bluetooth low
energy networks. In Proceedings of the 12th Confer-
ence on Security and Privacy in Wireless and Mobile
Networks, pages 267–276.
Coyac-Torres, J. E., Rivero-Angeles, M. E., and Aguirre-
Anaya, E. (2021). Cognitive radio based system
for best effort communications in sound-based covert
channel for iot environments. Mobile Networks and
Applications, 26:1449–1460.
Dalkılıc¸, F., C¸ abuk, U. C., Arıkan, E., and G
¨
urkan, A.
(2017). An analysis of the positioning accuracy of
ibeacon technology in indoor environments. In 2017
International Conference on Computer Science and
Engineering (UBMK), pages 549–553. IEEE.
Developer, A. (2014). Getting started with ibeacon. Re-
trieved May, 10:2018.
Eddystone (2018). https://github.com/google/eddystone/.
Gast, M. S. (2014). Building applications with IBeacon:
proximity and location services with bluetooth low en-
ergy. ” O’Reilly Media, Inc.”.
Gnad, D. R., Nguyen, C. D. K., Gillani, S. H., and Tahoori,
M. B. (2021). Voltage-based covert channels using
fpgas. ACM Transactions on Design Automation of
Electronic Systems (TODAES), 26(6):1–25.
Griffiths, S., Wong, M. S., Kwok, C. Y. T., Kam, R., Lam,
S. C., Yang, L., Yip, T. L., Heo, J., Chan, B. S. B.,
Xiong, G., et al. (2019). Exploring bluetooth beacon
use cases in teaching and learning: Increasing the sus-
tainability of physical learning spaces. Sustainability,
11(15):4005.
Hern
´
andez-Rojas, D. L., Fern
´
andez-Caram
´
es, T. M., Fraga-
Lamas, P., and Escudero, C. J. (2017). Design and
practical evaluation of a family of lightweight proto-
cols for heterogeneous sensing through ble beacons in
iot telemetry applications. Sensors, 18(1):57.
iBeacon Homepage (2015).
https://developer.apple.com/ibeacon/.
Kolias, C., Copi, L., Zhang, F., and Stavrou, A. (2017).
Breaking ble beacons for fun but mostly profit. In Pro-
ceedings of the 10th European Workshop on Systems
Security, pages 1–6.
Li, Y., Zhang, X., Xu, X., and Tan, Y.-a. (2020). A ro-
bust packet-dropout covert channel over wireless net-
works. IEEE Wireless Communications, 27(3):60–65.
Mackey, A., Spachos, P., Song, L., and Plataniotis, K. N.
(2020). Improving ble beacon proximity estimation
accuracy through bayesian filtering. IEEE Internet of
Things Journal, 7(4):3160–3169.
Maiti, A. and Jadliwala, M. (2019). Light ears: Information
leakage via smart lights. Proceedings of the ACM on
Interactive, Mobile, Wearable and Ubiquitous Tech-
nologies, 3(3):1–27.
Na, X., Guo, X., He, Y., and Xi, R. (2021). Wi-attack:
Cross-technology impersonation attack against ibea-
con services. In 2021 18th Annual IEEE Interna-
tional Conference on Sensing, Communication, and
Networking (SECON), pages 1–9. IEEE.
Priest, J. and Johnson, D. (2015). Covert channel over apple
ibeacon. In Proceedings of the International Confer-
ence on Security and Management (SAM), page 51.
The Steering Committee of The World Congress in
Computer Science, Computer . . . .
Saenger, J., Mazurczyk, W., Keller, J., and Caviglione, L.
(2020). Voip network covert channels to enhance
privacy and information sharing. Future Generation
Computer Systems, 111:96–106.
Schmidbauer, T., Keller, J., and Wendzel, S. (2022). Chal-
lenging channels: Encrypted covert channels within
challenge-response authentication. In Proceedings of
the 17th International Conference on Availability, Re-
liability and Security, pages 1–10.
Seong, H., Kim, I., Jeon, Y., Oh, M.-K., Lee, S., and Choi,
D. (2022). Practical covert wireless unidirectional
communication in ieee 802.11 environment. IEEE In-
ternet of Things Journal, 10(2):1499–1516.
Shan, G. and Roh, B.-H. (2018). Advertisement interval
to minimize discovery time of whole ble advertisers.
IEEE Access, 6:17817–17825.
Tian, J., Xiong, G., Li, Z., and Gou, G. (2020). A
survey of key technologies for constructing network
covert channel. Security and Communication Net-
works, 2020:1–20.
Zhang, Q., Zhang, X., Xue, Y., and Hu, J. (2020). A stealthy
covert storage channel for asymmetric surveillance
volte endpoints. Future Generation Computer Sys-
tems, 102:472–480.
Zhang, X., Tan, Y.-A., Liang, C., Li, Y., and Li, J. (2018).
A covert channel over volte via adjusting silence peri-
ods. IEEE Access, 6:9292–9302.
ICISSP 2024 - 10th International Conference on Information Systems Security and Privacy
868