Browse > Article
http://dx.doi.org/10.33778/kcsa.2020.20.5.011

An Intelligent Bluetooth Intrusion Detection System for the Real Time Detection in Electric Vehicle Charging System  

Yun, Young-Hoon (동신대학교/신재생에너지전공)
Kim, Dae-Woon (동신대학교/융합정보보안전공)
Choi, Jung-Ahn (동신대학교/융합정보보안전공)
Kang, Seung-Ho (동신대학교/융합정보보안전공)
Publication Information
Abstract
With the increase in cases of using Bluetooth devices used in the electric vehicle charging systems, security issues are also raised. Although various technical efforts have beed made to enhance security of bluetooth technology, various attack methods exist. In this paper, we propose an intelligent Bluetooth intrusion detection system based on a well-known machine learning method, Hidden Markov Model, for the purpose of detecting intelligently representative Bluetooth attack methods. The proposed approach combines packet types of H4, which is bluetooth transport layer protocol, and the transport directions of the packet firstly to represent the behavior of current traffic, and uses the temporal deployment of these combined types as the final input features for detecting attacks in real time as well as accurate detection. We construct the experimental environment for the data acquisition and analysis the performance of the proposed system against obtained data set.
Keywords
Electric Vehicle Charging System; Bluetooth; Intrusion Detection System; Information Security; Hidden Markov Model; Real Time Detection; Bluetooth Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Satam, S. Satam, and S. Hariri, Bluetooth Intrusion Detection System(BIDS), 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), October, 2018.
2 J. A. Choi, D. W. Kim, and S. H. Kang, "An intelligent Bluetooth Intursion Detection Systgem using Hidden Markov Model", Proceeding of Cyber Security Conference at Honam, October, 2020.
3 https://en.wikipedia.org/wiki/Bluetooth
4 K. Haataja and P. Toivanen, "Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures in IEEE Transactions on Wireless Communications", vol. 9, no. 1, pp. 384-392, January 2010.   DOI
5 https://www.essaysusa.com/article/types-of-bluetooth-attacks
6 J. Asharf, N. Moustafa, H. Khurshid, E. Debie, W. Haider and A. Wahab, "A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions", Electronics, 9(7), 2020.
7 L.R. Rabiner, "A tutorialj on hidden Markov models and selectd applications in speech recognition", Proceedings of the IEEE, 77(2), pp.257-286, February 1989.   DOI
8 https://packages.debian.org/unstable/btscanner
9 https://www.wireshark.org/
10 https://github.com/KimiNewt/pyshark
11 https://hmmlearn.readthedocs.io/en/latest/
12 https://github.com/crypt0b0y/BLUETOOTH-DOS-ATTACK-SCRIPT