{"id":9365,"date":"2024-07-02T09:31:08","date_gmt":"2024-07-02T09:31:08","guid":{"rendered":"https:\/\/www.beaconzone.co.uk\/blog\/?p=9365"},"modified":"2024-07-02T09:31:09","modified_gmt":"2024-07-02T09:31:09","slug":"using-covert-channels-with-ibeacon","status":"publish","type":"post","link":"https:\/\/www.beaconzone.co.uk\/blog\/using-covert-channels-with-ibeacon\/","title":{"rendered":"Using Covert Channels with iBeacon"},"content":{"rendered":"\n<p>A new study <a href=\"https:\/\/www.scitepress.org\/Papers\/2024\/124578\/124578.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Implementation and Analysis of Covert Channel Using iBeacon<\/a> (PDF) explores the creation and analysis of covert communication channels using iBeacon, which is based on Bluetooth Low Energy (BLE). Covert channels are methods used to transmit information secretly, bypassing normal security measures. <\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"908\" height=\"587\" src=\"https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2024\/05\/ibeaconpacket.jpg\" alt=\"\" class=\"wp-image-9366\" srcset=\"https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2024\/05\/ibeaconpacket.jpg 908w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2024\/05\/ibeaconpacket-300x194.jpg 300w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2024\/05\/ibeaconpacket-768x496.jpg 768w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p>The authors introduce two types of covert channels: one that uses the payload of the iBeacon broadcast messages and another that employs the broadcasting intervals. The payload-based covert channel modifies the UUID, Major, Minor, and TX power fields of the iBeacon packets to transmit covert messages. This method achieved a maximum throughput of 911,600 Bytes per second (Bps) with a Packet Delivery Rate (PDR) consistently above 75%, indicating its efficiency in transmitting substantial data covertly.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"781\" height=\"304\" src=\"https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2024\/05\/covertibeacon.jpg\" alt=\"\" class=\"wp-image-9368\" style=\"width:781px;height:auto\" srcset=\"https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2024\/05\/covertibeacon.jpg 781w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2024\/05\/covertibeacon-300x117.jpg 300w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2024\/05\/covertibeacon-768x299.jpg 768w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p>The interval-based covert channel, on the other hand, encodes messages in the time intervals between consecutive iBeacon broadcasts. Although this method provides higher concealment compared to payload-based channels, it has a lower channel capacity and can cause transmission delays.<\/p>\n\n\n\n<p>The experimental setup involved using Raspberry Pi devices to simulate the transmission and reception of iBeacon packets, where various advertising intervals were tested. The findings highlighted that shorter advertising intervals resulted in higher throughput, with the best performance observed in the 100\u2013200 ms range.<\/p>\n\n\n\n<p>The study concludes by emphasising the potential for significant data transmission through BLE beacons and suggests future research to explore countermeasures against such covert channels.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new study Implementation and Analysis of Covert Channel Using iBeacon (PDF) explores the creation and analysis of covert communication channels using iBeacon, which is based on Bluetooth Low Energy (BLE). Covert channels are methods used to transmit information secretly, bypassing normal security measures. The authors introduce two types of covert channels: one that uses &hellip; <a href=\"https:\/\/www.beaconzone.co.uk\/blog\/using-covert-channels-with-ibeacon\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Using Covert Channels with iBeacon&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,61],"tags":[],"_links":{"self":[{"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/posts\/9365"}],"collection":[{"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=9365"}],"version-history":[{"count":7,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/posts\/9365\/revisions"}],"predecessor-version":[{"id":9424,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/posts\/9365\/revisions\/9424"}],"wp:attachment":[{"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=9365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=9365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=9365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}