Implementation and Analysis of Covert Channel Using iBeacon

Ye-Sol Oh, Yeon-Ji Lee, Jiwon Jang, Hyunwoo Choi, Il-Gu Lee

2024

Abstract

Covert channels are typically employed to transmit information and bypass security policies and controls simultaneously to maintain undetected communication. Various techniques have been proposed for establishing covert channels, including those at the network level, and for using different components. This study investigated the security implications of Apple’s iBeacon broadcast messages by focusing on the establishment of covert channels. We introduce two Bluetooth Low Energy (BLE) covert channels: one using broadcast payloads and the other employing broadcasting intervals. These channels can be used in a complementary manner, balancing covertness and bandwidth. In our evaluation, the payload-based covert channel achieved a maximum throughput of 911,600 Bytes per second (Bps) with a Packet Delivery Rate (PDR) exceeding 75%, demonstrating its capability to transmit substantial data via iBeacon covertly. This study focuses on enhancing the security of BLE Beacon deployment.

Download


Paper Citation


in Harvard Style

Oh Y., Lee Y., Jang J., Choi H. and Lee I. (2024). Implementation and Analysis of Covert Channel Using iBeacon. In Proceedings of the 10th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP; ISBN 978-989-758-683-5, SciTePress, pages 861-868. DOI: 10.5220/0012457800003648


in Bibtex Style

@conference{icissp24,
author={Ye-Sol Oh and Yeon-Ji Lee and Jiwon Jang and Hyunwoo Choi and Il-Gu Lee},
title={Implementation and Analysis of Covert Channel Using iBeacon},
booktitle={Proceedings of the 10th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP},
year={2024},
pages={861-868},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012457800003648},
isbn={978-989-758-683-5},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 10th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP
TI - Implementation and Analysis of Covert Channel Using iBeacon
SN - 978-989-758-683-5
AU - Oh Y.
AU - Lee Y.
AU - Jang J.
AU - Choi H.
AU - Lee I.
PY - 2024
SP - 861
EP - 868
DO - 10.5220/0012457800003648
PB - SciTePress