Assessing cybersecurity risks in BLE-based asset management systems

Detalhes bibliográficos
Autor(a) principal: Verde, David Lu?s Malh?o
Data de Publicação: 2024
Tipo de documento: Dissertação
Idioma: eng
Título da fonte: Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
Texto Completo: http://hdl.handle.net/20.500.11960/3949
Resumo: In the current era of digital transformation, Asset Management (AM) systems using Bluetooth Low Energy (BLE) beacons are being applied across various domains, allowing for the detection of individuals or objects within a building. While the impact of a compromised Indoor Positioning System (IPS) may not be significant in certain domains, in others it can pose risks and potentially lead to the loss of human lives or other significant consequences. This work starts with a literature review on vulnerabilities that target BLE beacon devices. With the gathered knowledge from the review, a risk assessment of cyber-attacks targeting AM systems using BLE devices in two specific scenarios is presented: health- care and industry. The aim is to estimate the attacks that pose the greatest risk in each application area. An experimental setup was also created with a focus on testing a set of vulnerabilities, such as replay attack, device cloning, jamming, battery exhaustion at- tack and physical hijacking. Lastly, mitigation measures and a list of best practices and guidelines are proposed to help harden these systems. Results show that, risk levels vary depending on the targeted scenario. Replay, battery exhaustion, jamming, fuzzing, blue-smack, and physical hijacking attacks are the ones that pose the greatest risk levels in the considered scenarios. Additionally, the vulnerabilities exploited in the experimental setup manifest a concerning accessibility, that can lead to irreversible damages.
id RCAP_7152f653e03fd7b3ece4daa42fe2adab
oai_identifier_str oai:repositorio.ipvc.pt:20.500.11960/3949
network_acronym_str RCAP
network_name_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository_id_str 7160
spelling Assessing cybersecurity risks in BLE-based asset management systemsIndoor-location securityAsset managementBLE beaconsBluetoothCybersecurityLocaliza??o indoor seguraGest?o de recursosCiberseguran?aIn the current era of digital transformation, Asset Management (AM) systems using Bluetooth Low Energy (BLE) beacons are being applied across various domains, allowing for the detection of individuals or objects within a building. While the impact of a compromised Indoor Positioning System (IPS) may not be significant in certain domains, in others it can pose risks and potentially lead to the loss of human lives or other significant consequences. This work starts with a literature review on vulnerabilities that target BLE beacon devices. With the gathered knowledge from the review, a risk assessment of cyber-attacks targeting AM systems using BLE devices in two specific scenarios is presented: health- care and industry. The aim is to estimate the attacks that pose the greatest risk in each application area. An experimental setup was also created with a focus on testing a set of vulnerabilities, such as replay attack, device cloning, jamming, battery exhaustion at- tack and physical hijacking. Lastly, mitigation measures and a list of best practices and guidelines are proposed to help harden these systems. Results show that, risk levels vary depending on the targeted scenario. Replay, battery exhaustion, jamming, fuzzing, blue-smack, and physical hijacking attacks are the ones that pose the greatest risk levels in the considered scenarios. Additionally, the vulnerabilities exploited in the experimental setup manifest a concerning accessibility, that can lead to irreversible damages.Na atual era da transforma??o digital, os sistemas de gest?o de ativos que utilizam BLE descons est?o a ser aplicados em v?rias ?reas, permitindo a detec??o de indiv?duos ou objetos em ambientes interiores. Enquanto o impacto de um IPS comprometido pode n?o ser significativo em certos contextos, em aplica??es criticas, pode apresentar riscos significativos, podendo, no limite, levar ? perda de vidas humanas, entre outras consequ?ncias poss?veis Este trabalho inicia com uma revis?o sistem?tica das vulnerabilidades direcionadas aos dispositivos BLE bezcons. Com o conhecimento resultante desta revis?o, ? apresentada uma avalia??o de riscos de ciberataques direcionados a sistemas de gest?o de ativos que usam tecnologia BLE em dois dom?nios de aplica??o espec?ficos sa?de e ind?stria. O objetivo ? identificar os ataques que apresentam o maior risco em cada dom?nio de aplica??o. Foi tamb?m criado um ambiente experimental desenhado para testar um conjunto de vulnerabilidades, tais como, ataques de repeti??o, clonagem de dispositivos, interfer?ncia, exaust?o de bateria e ataque f?sico. Por fim, s?o propostas medidas de mitiga??o para os riscos identificados, bem como identificadas as melhores pr?ticas e diretrizes para refor?ar a seguran?a da utiliza??o destes sistemas nos dois dom?nios de aplica??o identificados Os resultados mostram que os n?veis de risco variam dependendo do dom?nio de aplica??o e do tipo de ataque. Os ataques de repeti??o, exaust?o de bateria, interfer?ncia, confus?o, blue-smack e ataque f?sico representam os maiores n?veis de risco nos cen?rios considerados. Al?m disso, as vulnerabilidades exploradas no ambiente experimental evidenciam uma acessibilidade preocupante, que pode levar a danos irrevers?veis.2024-03-13T15:05:18Z2024-01-08T00:00:00Z2024-01-08info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesisapplication/pdfhttp://hdl.handle.net/20.500.11960/3949TID:203551729engVerde, David Lu?s Malh?oinfo:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2024-03-14T07:12:36Zoai:repositorio.ipvc.pt:20.500.11960/3949Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-20T04:00:36.408542Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse
dc.title.none.fl_str_mv Assessing cybersecurity risks in BLE-based asset management systems
title Assessing cybersecurity risks in BLE-based asset management systems
spellingShingle Assessing cybersecurity risks in BLE-based asset management systems
Verde, David Lu?s Malh?o
Indoor-location security
Asset management
BLE beacons
Bluetooth
Cybersecurity
Localiza??o indoor segura
Gest?o de recursos
Ciberseguran?a
title_short Assessing cybersecurity risks in BLE-based asset management systems
title_full Assessing cybersecurity risks in BLE-based asset management systems
title_fullStr Assessing cybersecurity risks in BLE-based asset management systems
title_full_unstemmed Assessing cybersecurity risks in BLE-based asset management systems
title_sort Assessing cybersecurity risks in BLE-based asset management systems
author Verde, David Lu?s Malh?o
author_facet Verde, David Lu?s Malh?o
author_role author
dc.contributor.author.fl_str_mv Verde, David Lu?s Malh?o
dc.subject.por.fl_str_mv Indoor-location security
Asset management
BLE beacons
Bluetooth
Cybersecurity
Localiza??o indoor segura
Gest?o de recursos
Ciberseguran?a
topic Indoor-location security
Asset management
BLE beacons
Bluetooth
Cybersecurity
Localiza??o indoor segura
Gest?o de recursos
Ciberseguran?a
description In the current era of digital transformation, Asset Management (AM) systems using Bluetooth Low Energy (BLE) beacons are being applied across various domains, allowing for the detection of individuals or objects within a building. While the impact of a compromised Indoor Positioning System (IPS) may not be significant in certain domains, in others it can pose risks and potentially lead to the loss of human lives or other significant consequences. This work starts with a literature review on vulnerabilities that target BLE beacon devices. With the gathered knowledge from the review, a risk assessment of cyber-attacks targeting AM systems using BLE devices in two specific scenarios is presented: health- care and industry. The aim is to estimate the attacks that pose the greatest risk in each application area. An experimental setup was also created with a focus on testing a set of vulnerabilities, such as replay attack, device cloning, jamming, battery exhaustion at- tack and physical hijacking. Lastly, mitigation measures and a list of best practices and guidelines are proposed to help harden these systems. Results show that, risk levels vary depending on the targeted scenario. Replay, battery exhaustion, jamming, fuzzing, blue-smack, and physical hijacking attacks are the ones that pose the greatest risk levels in the considered scenarios. Additionally, the vulnerabilities exploited in the experimental setup manifest a concerning accessibility, that can lead to irreversible damages.
publishDate 2024
dc.date.none.fl_str_mv 2024-03-13T15:05:18Z
2024-01-08T00:00:00Z
2024-01-08
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/masterThesis
format masterThesis
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://hdl.handle.net/20.500.11960/3949
TID:203551729
url http://hdl.handle.net/20.500.11960/3949
identifier_str_mv TID:203551729
dc.language.iso.fl_str_mv eng
language eng
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.source.none.fl_str_mv reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron:RCAAP
instname_str Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron_str RCAAP
institution RCAAP
reponame_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
collection Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository.name.fl_str_mv Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
repository.mail.fl_str_mv
_version_ 1799138181494341632