About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II

Research Article

Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy

Download(Requires a free EAI acccount)
2 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-90022-9_13,
        author={Pallavi Sivakumaran and Jorge Blasco},
        title={Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy},
        proceedings={Security and Privacy in Communication Networks. 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6--9, 2021, Proceedings, Part II},
        proceedings_a={SECURECOMM PART 2},
        year={2021},
        month={11},
        keywords={Bluetooth low energy Application-level security Multi-application platforms GATT},
        doi={10.1007/978-3-030-90022-9_13}
    }
    
  • Pallavi Sivakumaran
    Jorge Blasco
    Year: 2021
    Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy
    SECURECOMM PART 2
    Springer
    DOI: 10.1007/978-3-030-90022-9_13
Pallavi Sivakumaran1,*, Jorge Blasco1
  • 1: Royal Holloway
*Contact email: pallavi.sivakumaran.2012@rhul.ac.uk

Abstract

Bluetooth Low Energy (BLE) is a popular wireless technology deployed in billions of devices within the Internet-of-Things (IoT). The data on these devices is often related to user health or used to control safety-critical functionality, which makes it vital to protect the data from unauthorised access or manipulations. The only mechanism that is fully defined within the BLE specification for protecting sensitive data ispairing. This occurs at the device-level rather than at the application-level, and leaves BLE data vulnerable to unauthorised access at higher layers. When a BLE device interacts with a multi-application platform (i.e., a device that hosts more than one application, such as a mobile phone), when one application is able to access data from the BLE peer, all other applications on the same multi-application platform are also implicitly allowed the same access. The solutions suggested thus far for this vulnerability are either impractical for most users, not backward compatible with billions of existing devices, or do not suit normal BLE usage scenarios. In this paper, we conduct an analysis considering practical aspects regarding the BLE ecosystem, and thereafter propose a solution that will extend the available protection for BLE data to the application layer. Our solution ensures protection by default for BLE data, and is entirely backward compatible with existing BLE implementations, requiring no modification to resource-constrained BLE peripherals or companion applications. We also present an open-source proof-of-concept implemented on the Android-x86 platform. This, when tested against experimental and real-world devices and applications, demonstrates the viability and efficacy of our proposed solution.

Keywords
Bluetooth low energy Application-level security Multi-application platforms GATT
Published
2021-11-04
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-90022-9_13
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL