Skip to content
This repository has been archived by the owner on Mar 6, 2023. It is now read-only.

Latest commit

 

History

History
57 lines (33 loc) · 3.06 KB

README.md

File metadata and controls

57 lines (33 loc) · 3.06 KB

SADS : Spoofing Attack Detection System at Indoor Positioning using BLE

1. 프로젝트 소개

Bluetooth Low Energy (BLE)를 활용한 실내 위치 측위에서의 스푸핑 공격 감지 기법

본 프로젝트는 BLE 장치와의 일대일 통신을 기반으로 비콘 메시지의 수신 시간 간격과 Received Signal Strength Indicator (RSSI)를 사용하여 스푸핑 공격을 감지하고 공격자의 비콘 메시지를 특정할 수 있는 보안 방법 및 시스템을 소개합니다.

실험 환경

2. Abstract

The Received Signal Strength Indicator (RSSI) of the Bluetooth Low Energy (BLE) device varies depending on the distance between the transmitter and the receiver. Due to this characteristic, location positioning techniques using beacon messages (Advertising Packets) of BLE devices have been actively studied. However, since beacon messages that are regularly broadcast by the BLE device are disclosed, so anyone can check the information of beacon messages in a simple way (Beacon scan app, Bluetooth library, etc). Beacon messages include not only the company name and type of the BLE device, but also Universal Unique Identifier (UUID) and MAC Address, which act as identifiers, making them very vulnerable to spoofing attacks. Therefore, we propose a Spoofing Attack Detection System (SADS) that can detect spoofing attacks using physical elements of beacon messages. Based on one-to-one communication between the BLE device and the server, the proposed system detects spoofing attacks regardless of the distance between the tag and the attacker and distinguishes the attacker's beacon message.

3. 소개 영상

프로젝트 소개 영상

시연 동영상

4. 팀 소개

노용준


문성찬

5. 사용법