2007 IEEE SMC Information Assurance and Security Workshop 2007
DOI: 10.1109/iaw.2007.381925
|View full text |Cite
|
Sign up to set email alerts
|

Battery Polling and Trace Determination for Bluetooth Attack Detection in Mobile Devices

Abstract: This paper introduces a supporting model for a (Bluetooth) and IEEE 802.11 (Wi-Fi) attack activity that unique Battery-Sensing Intrusion Protection System (B-SIPS) for standard IDSs are incapable of detecting [1]. mobile computers, which alerts when power changes are detectedThis research further examines various means to refine the on small wireless devices. An analytical model is employed to B-SIPS detection capabilities. Smart battery polling rates, examine the smart battery characteristics to support … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2007
2007
2010
2010

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…[36] Buennemeyer et al provided a means of detecting Bluetooth battery depletion attacks using an anomaly detection system that measured the power levels of a particular Bluetooth device. [23] …”
Section: Wireless and Mobile Threat Modelingmentioning
confidence: 97%
See 1 more Smart Citation
“…[36] Buennemeyer et al provided a means of detecting Bluetooth battery depletion attacks using an anomaly detection system that measured the power levels of a particular Bluetooth device. [23] …”
Section: Wireless and Mobile Threat Modelingmentioning
confidence: 97%
“…Researchers at Virginia Tech have shown how to combine classic Internet protocol attacks such as the SYN flood with a Bluetooth distribution scheme. [23] As the number of attacks have grown, so have the severity of attacks and the ease of implementation. Repositories of attacks exist with source code.…”
Section: Emerging Trendsmentioning
confidence: 99%
“…Until recently, many Bluetooth device users considered their systems to be safe from attack. Table 1 [14] indicates that Bluetooth exploits and emerging attacks are increasing. The ever changing state of attack vectors has opened another avenue for attack signature development, which encompasses the characterization of Bluetooth wireless personal area network (WPAN) attacks.…”
Section: Proceedings Of the 42nd Hawaii International Conference On Smentioning
confidence: 99%
“…This will offer greater opportunities to develop battery-based trace signatures, since Bluetooth capable devices tend to be of low powered design. Attacking exposed hosts through unsecured WPANs would allow the attacker direct access to the mobile device and its OS environment, completely bypassing any upstream defensive measures [14]. This observation suggests that mobile devices have an increasing need for hybrid IDS protection such as B-SIPS.…”
Section: Proceedings Of the 42nd Hawaii International Conference On Smentioning
confidence: 99%
See 1 more Smart Citation