Bluetooth Low‐Energy Beacon Resistance to Jamming Attack - volodymyr-sokolov/publications GitHub Wiki

Conference Paper

Volodymyr Sokolov , Pavlo Skladannyi , Volodymyr Astapenya

Abstract

To assess the potential damage from jamming attacks on a Bluetooth Low-Energy (BLE) Beacon device, an experimental setup with a packet emitter, sniffer, and signal spectrum control at the receiving point was used. With less than 0.7% of successfully delivered packets, it is impossible to talk about the success of even non-critical equipment. From the ratio of single-error packets to lost packets rate, it can be seen that the tipping point occurs on the chart at minus 12 dBm for a 2 Mb/s baud rate. An increase in the level of the interference signal may be invisible to the user until a certain point when the number of errors in the system begins to increase like an avalanche. This results in an increase in lost packets and the generation of new traffic due to retransmissions. However the additional traffic is also subject to interference, so the useful data rate is reduced even more. It should be noted that for low transmission rates, the single-error packets to lost packets rate is constant.

https://ieeexplore.ieee.org/document/10310815 | 10.1109/ELIT61488.2023.10310815

Keywords

AltBeacon; beacon; BLE; Bluetooth Low-Energy; Eddystone; iBeacon; jamming; PER

SciVal Topics

Neural Network; Wireless Sensor Network; Quality of Service


Publisher

2023 IEEE 13th International Conference on Electronics and Information Technologies (ELIT)

26–28 September 2023 Lviv, Ukraine

First Online: 10 November 2023


Indices

  • INSPEC: 24127267

  • KUBG: 46982


Cite

CEUR-WS

V. Sokolov, P. Skladannyi, V. Astapenya, Bluetooth Low-Energy Beacon Resistance to Jamming Attack, in: IEEE 13th International Conference on Electronics and Information Technologies (2023) 270–274. doi: 10.1109/ELIT61488.2023.10310815.

⚠️ **GitHub.com Fallback** ⚠️