针对当前资产定位系统定位精度、建设成本和部署灵活性难以有效平衡的问题,基于BLE Mesh采用多维标度分析(MultiDimensional Scaling-Map,MDS-MAP)定位算法设计了一种资产定位系统。系统首先对原始接收信号强度(Received Signal Strengt...针对当前资产定位系统定位精度、建设成本和部署灵活性难以有效平衡的问题,基于BLE Mesh采用多维标度分析(MultiDimensional Scaling-Map,MDS-MAP)定位算法设计了一种资产定位系统。系统首先对原始接收信号强度(Received Signal Strength Indicator,RSSI)进行高斯-卡尔曼融合滤波,提高了RSSI值的准确性;然后利用生存时间(Time To Live,TTL)对中继节点进行约束,提高了数据传输的有效性;最后利用半径弥补法与Bellman-Ford融合迭代方案对生成的距离矩阵进行修正,减小了测距误差。实验结果表明,所设计的系统可有效完成蓝牙标签信息更新以及位置展示,平均定位精度达到了0.94 m。本系统具有成本低、工程实施方便的优点,有一定的应用价值和发展前景。展开更多
Indoor organization user activity’s (UA) direction detection monitoring system and also emergency prediction are major challenging tasks in the field of the typical body sensor and indoor fixed sensor networks. ...Indoor organization user activity’s (UA) direction detection monitoring system and also emergency prediction are major challenging tasks in the field of the typical body sensor and indoor fixed sensor networks. In this paper, indoor UA based direction detection monitoring system is achieved by the combination of both the orientation sensor and Bluetooth Low Energy (BLE) in user’s smartphones belonging to the Internet of Things (IoT). The orientation sensor senses the actual orientation of the user and BLE transmits the sensed BLE signals to monitoring system using star topology in IoT. In monitoring system, classification algorithm is used to identify the directions of the smartphone users. The emergency situation of the user is also predicted based on signal variation instantly in real time. The user activity’s signals are captured using LabVIEW toolkit then applied to various classification algorithms such asRF—91.42%, Ibk—90.55%, j48— 85.61%, K*—73.54% are the results obtained. An average of 85% was obtained in all the classifi- cation algorithims indicating the consistency and accuracy in detecting the directions of the users. RF was found to be the best among all the classification algorithms. IoT enabled devices have high demand in near coming future, moreover smartphones users increase day by day, hence implementing and maintaining the above said system would be much easier and cheaper compared to other conventional networks.展开更多
In the era of the Internet of Things,Bluetooth low energy(BLE/BTLE)plays an important role as a wellknown wireless communication technology.While the security and privacy of BLE have been analyzed and fixed several ti...In the era of the Internet of Things,Bluetooth low energy(BLE/BTLE)plays an important role as a wellknown wireless communication technology.While the security and privacy of BLE have been analyzed and fixed several times,the threat of side-channel attacks to BLE devices is still not well understood.In this work,we highlight a side-channel threat to the re-keying protocol of BLE.This protocol uses a fixed long term key for generating session keys,and the leakage of the long term key could render the encryption of all the following(and previous)connections useless.Our attack exploits the side-channel leakage of the re-keying protocol when it is implemented on embedded devices.In particular,we present successful correlation electromagnetic analysis and deep learning based profiled analysis that recover long term keys of BLE devices.We evaluate our attack on an ARM Cortex-M4 processor(Nordic Semiconductor nRF52840)running Nimble,a popular open-source BLE stack.Our results demonstrate that the long term key can be recovered within only a small amount of electromagnetic traces.Further,we summarize the features and limitations of our attack,and suggest a range of countermeasures to prevent it.展开更多
With the rapid development of the Internet of Things(IoT),wireless technology has become an indispensable part of modern computing platforms and embedded systems.Wireless device fingerprint identification is deemed as...With the rapid development of the Internet of Things(IoT),wireless technology has become an indispensable part of modern computing platforms and embedded systems.Wireless device fingerprint identification is deemed as a promising solution towards enhancing the security of device access authentication and communication process in the IoT scenario.However,the extraction of features from the network layer and its upper layers often confront restrictions from specific devices:the association with a certain wireless network and the access to the plaintext of the payload.Meanwhile,Bluetooth Low Energy(BLE)packets have been encrypted above the link layer,which makes those features difficult to extract.To tackle these problems,we introduce a novel method to identify BLE devices based on the fingerprint features in the data link layer.Initially,the BLE packets are collected through a receiver based on software-defined radio technology.Then,fields that reflect device differences in BLE broadcast packets are extracted through traffic analysis.Finally,a MultiLayer Perceptron(MLP)model is employed to recognize the category of BLE devices.An experimental result on a dataset with 15 types of BLE devices shows that the identification accuracy of the proposed method can reach 99.8%,which accomplishes better performance over previous work.展开更多
文摘针对当前资产定位系统定位精度、建设成本和部署灵活性难以有效平衡的问题,基于BLE Mesh采用多维标度分析(MultiDimensional Scaling-Map,MDS-MAP)定位算法设计了一种资产定位系统。系统首先对原始接收信号强度(Received Signal Strength Indicator,RSSI)进行高斯-卡尔曼融合滤波,提高了RSSI值的准确性;然后利用生存时间(Time To Live,TTL)对中继节点进行约束,提高了数据传输的有效性;最后利用半径弥补法与Bellman-Ford融合迭代方案对生成的距离矩阵进行修正,减小了测距误差。实验结果表明,所设计的系统可有效完成蓝牙标签信息更新以及位置展示,平均定位精度达到了0.94 m。本系统具有成本低、工程实施方便的优点,有一定的应用价值和发展前景。
文摘Indoor organization user activity’s (UA) direction detection monitoring system and also emergency prediction are major challenging tasks in the field of the typical body sensor and indoor fixed sensor networks. In this paper, indoor UA based direction detection monitoring system is achieved by the combination of both the orientation sensor and Bluetooth Low Energy (BLE) in user’s smartphones belonging to the Internet of Things (IoT). The orientation sensor senses the actual orientation of the user and BLE transmits the sensed BLE signals to monitoring system using star topology in IoT. In monitoring system, classification algorithm is used to identify the directions of the smartphone users. The emergency situation of the user is also predicted based on signal variation instantly in real time. The user activity’s signals are captured using LabVIEW toolkit then applied to various classification algorithms such asRF—91.42%, Ibk—90.55%, j48— 85.61%, K*—73.54% are the results obtained. An average of 85% was obtained in all the classifi- cation algorithims indicating the consistency and accuracy in detecting the directions of the users. RF was found to be the best among all the classification algorithms. IoT enabled devices have high demand in near coming future, moreover smartphones users increase day by day, hence implementing and maintaining the above said system would be much easier and cheaper compared to other conventional networks.
基金supported by the National Natural Science Foundation of China under Grant No.62072307。
文摘In the era of the Internet of Things,Bluetooth low energy(BLE/BTLE)plays an important role as a wellknown wireless communication technology.While the security and privacy of BLE have been analyzed and fixed several times,the threat of side-channel attacks to BLE devices is still not well understood.In this work,we highlight a side-channel threat to the re-keying protocol of BLE.This protocol uses a fixed long term key for generating session keys,and the leakage of the long term key could render the encryption of all the following(and previous)connections useless.Our attack exploits the side-channel leakage of the re-keying protocol when it is implemented on embedded devices.In particular,we present successful correlation electromagnetic analysis and deep learning based profiled analysis that recover long term keys of BLE devices.We evaluate our attack on an ARM Cortex-M4 processor(Nordic Semiconductor nRF52840)running Nimble,a popular open-source BLE stack.Our results demonstrate that the long term key can be recovered within only a small amount of electromagnetic traces.Further,we summarize the features and limitations of our attack,and suggest a range of countermeasures to prevent it.
基金supported by the National Natural Science Foundation of China(Nos.61972085,62072103,62232004)the Jiangsu Provincial Key R&D Program(Nos.BE2021729,BE2022680,BE2022065-4)+3 种基金the Jiangsu Provincial Key Laboratory of Network and Information Security(No.BM2003201)the Key Laboratory of Computer Network and Information Integration of Ministry of Education of China(No.93K-9)the Collaborative Innovation Center of Novel Software Technology and Industrialization,the Fundamental Research Funds for the Central Universities,the CCF-Baidu Open Fund(No.2021PP15002000)the Future Network Scientific Research Fund Project(No.FNSRFP-2021-YB-02).
文摘With the rapid development of the Internet of Things(IoT),wireless technology has become an indispensable part of modern computing platforms and embedded systems.Wireless device fingerprint identification is deemed as a promising solution towards enhancing the security of device access authentication and communication process in the IoT scenario.However,the extraction of features from the network layer and its upper layers often confront restrictions from specific devices:the association with a certain wireless network and the access to the plaintext of the payload.Meanwhile,Bluetooth Low Energy(BLE)packets have been encrypted above the link layer,which makes those features difficult to extract.To tackle these problems,we introduce a novel method to identify BLE devices based on the fingerprint features in the data link layer.Initially,the BLE packets are collected through a receiver based on software-defined radio technology.Then,fields that reflect device differences in BLE broadcast packets are extracted through traffic analysis.Finally,a MultiLayer Perceptron(MLP)model is employed to recognize the category of BLE devices.An experimental result on a dataset with 15 types of BLE devices shows that the identification accuracy of the proposed method can reach 99.8%,which accomplishes better performance over previous work.