Offensive and Defensive Approaches for Wireless Communication Protocols Security in IoT

Offensive and Defensive Approaches for Wireless Communication Protocols Security in IoT
Author :
Publisher :
Total Pages : 0
Release :
ISBN-10 : OCLC:1356809062
ISBN-13 :
Rating : 4/5 ( Downloads)

Book Synopsis Offensive and Defensive Approaches for Wireless Communication Protocols Security in IoT by : Romain Cayre

Download or read book Offensive and Defensive Approaches for Wireless Communication Protocols Security in IoT written by Romain Cayre and published by . This book was released on 2022 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: In the recent years, a new kind of devices, so-called connected objects, has been actively deployed, spreading everywhere in our daily life. These devices aim to interact with the physical world while providing a connectivity which is generally based on a new generation of wireless communication protocols such as Zigbee, Bluetooth Low Energy or Thread. The rapid and massive deployment of these new wireless technologies in the context of Internet of Things introduces new challenges from a security perspective. These challenges are mainly linked to the heterogeneity of these protocols, the decentralized and dynamical environments where they are deployed, and their co-existence in the same environments.This PhD thesis is a contribution to the security of wireless communication protocols, both from an offensive and a defensive perspective. We especially focus on the lower layers of the protocol stacks, which are very difficult to analyze.The first offensive contribution of this work highlights some critical vulnerabilities which are linked to the design of the protocols and can't be fixed easily without significantly modifying the specification. We present the InjectaBLE vulnerability allowing an attacker to inject arbitrary packets into an established Bluetooth Low Energy connection. We also show that exploiting this vulnerability may allow the attacker to divert some low level mechanisms in order to perform complex attacks, such as hijacking or man-in-the-middle attacks.We also worked on the security risks linked to the co-existence of heterogeneous wireless communication protocols in the same environments. Our second offensive contribution demonstrates the feasibility of diverting a Bluetooth Low Energy transceiver in order to interact with other protocols such as Zigbee or Enhanced ShockBurst, which are not natively supported by the chip. We highlight the practical feasibility of implementing such a strategy on multiple devices, including smartphones and connected objects, and we show that this offensive strategy allow pivoting attacks or covert-channel attacks, which are especially difficult to anticipate and mitigate.The existence of such offensive strategies which are linked to the low level internals of the wireless communication protocols, requires the development of efficient mitigations, especially intrusion detection and prevention strategies. However, designing such mitigations remains a complex challenge because of the decentralization and dynamicity of wireless environments where connected objects are deployed. Our defensive contributions introduce two innovative defensive approaches, facilitating the deployment of Intrusion Detection Systems and Intrusion Prevention Systems in such environments. Our first contribution, named Oasis, demonstrates the feasibility of embedding detection mechanisms directly into the connected objects. We mainly show that such a defensive strategy allows the extraction of low level indicators which can be analyzed to perform a reliable detection of the main protocol attacks targeting the Bluetooth Low Energy protocol. Our second defensive contribution focuses on the intrusion prevention challenge, and introduces an approach based on reactive jamming to efficiently filter malicious traffic. We show the genericity of these prevention strategy by implementing it in practice on three major wireless protocols commonly used in IoT: Bluetooth Low Energy, Zigbee and Enhanced ShockBurst.


Offensive and Defensive Approaches for Wireless Communication Protocols Security in IoT Related Books

Offensive and Defensive Approaches for Wireless Communication Protocols Security in IoT
Language: en
Pages: 0
Authors: Romain Cayre
Categories:
Type: BOOK - Published: 2022 - Publisher:

GET EBOOK

In the recent years, a new kind of devices, so-called connected objects, has been actively deployed, spreading everywhere in our daily life. These devices aim t
Designing Sustainable Internet of Things Solutions for Smart Industries
Language: en
Pages: 494
Authors: Thandekkattu, Salu George
Categories: Business & Economics
Type: BOOK - Published: 2024-09-16 - Publisher: IGI Global

GET EBOOK

As industries worldwide grapple with the dual challenge of meeting modernization demands while addressing urgent environmental concerns, the need for sustainabl
Deep Learning Model Optimization, Deployment and Improvement Techniques for Edge-native Applications
Language: en
Pages: 427
Authors: Pethuru Raj
Categories: Computers
Type: BOOK - Published: 2024-08-22 - Publisher: Cambridge Scholars Publishing

GET EBOOK

The edge AI implementation technologies are fast maturing and stabilizing. Edge AI digitally transforms retail, manufacturing, healthcare, financial services, t
Security Framework and Defense Mechanisms for IoT Reactive Jamming Attacks
Language: en
Pages: 128
Authors: Fadele Ayotunde Alaba
Categories:
Type: BOOK - Published: - Publisher: Springer Nature

GET EBOOK

Wireless Security and Cryptography
Language: en
Pages: 526
Authors: Nicolas Sklavos
Categories: Technology & Engineering
Type: BOOK - Published: 2017-12-19 - Publisher: CRC Press

GET EBOOK

As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing syst