Research Article
BibTex RIS Cite
Year 2022, Volume: 18 Issue: 1, 53 - 58, 25.03.2022
https://doi.org/10.18466/cbayarfbe.856119

Abstract

References

  • Zhang, N, Mi, X, Feng, X, Wang, X, Tian, Y, Qian, F. 2018. Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home. https://arxiv.org/pdf/1805.01525.pdf
  • Alrawi, O, Lever, C, Antonakakis, M, Monrose, F. 2019 SoK: Security Evaluation of Home-Based IoT Deployments. IEEE Symposium on Security and Privacy. San Francisco, Ca. 20-22 May 2019. Doi:10.1109/SP.2019.00013
  • Park, M, James JI. 2018. Preliminary Study of a Google Home Mini. Journal of Digital Forensics 2018 June, 12(1). https://arxiv.org/pdf/2001.04574
  • Caputo, D, Verderame, L, Ranieri, A, Merlo, A, & Caviglione, L. 2020. Fine- hearing Google Home: why silence will not protect your privacy. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 11(1), 35-53. https://doi.org/10.22667/JOWUA.2020.03.31.035
  • Çepik, H, Aydın, Ö, Dalkılıç, G. 2020. Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device. 7th International Management Information Systems Conference. İzmir, Turkey. 09-11.12.2020.
  • Google Nest, https://en.wikipedia.org/wiki/Google_Nest_(smart_speakers) (accessed at 07.01.2021).
  • Google Home specifications. Google Home Help. Google. Retrieved December 6, 2017.
  • Demmitt, J. 2015. "Google's Nest Labs plans top secret project at new Seattle engineering center". Geekwire.
  • Statt, N, Bohn, D. 2019. Google Nest: Why Google finally embraced Nest as its smart home brand". The Verge. Retrieved October 9, 2019.
  • Blynk. http://www.blynk.cc/. (accessed at 07.01.2021).
  • Mills, D. 1995. Simple network time protocol (SNTP). RFC 1769, University of Delaware. https://www.hjp.at/doc/rfc/rfc1769.html. (accessed at 07.01.2021).
  • Uy, M. 2020. Bluetooth Basics. Lifewire web site. Retrieved from https://www.lifewire.com/what-is-bluetooth-2377412, (accessed at 07.01.2021).
  • Imperva 2020. Ping of Death (POD). Imperva, Inc. Web site. Retrived from https://www.imperva.com/learn/ddos/ping-of-death/, (accessed at 07.01.2021).
  • Huegen, C. A. 1998. Network-Based Denial of Service Attacks. IEEE Transactions on Information Theory.
  • Singh, A. 2013. Instant Kali Linux. Packt Publishing Ltd.
  • l2ping, https://linux.die.net/man/1/l2ping (accessed at 07.01.2021).
  • https://github.com/Anlos0023/bluedoser (accessed at 07.01.2021).
  • Bluetooth Dos Attack Script, https://github.com/crypt0b0y/BLUETOOTH-DOS-ATTACK-SCRIPT (accessed at 07.01.2021).
  • Debian, https://en.wikipedia.org/wiki/Debian (accessed at 07.01.2021).
  • Blues, http://www.bluez.org/ (accessed at 07.01.2021).
  • HciTool, https://linux.die.net/man/1/hcitool (accessed at 07.01.2021).

Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini

Year 2022, Volume: 18 Issue: 1, 53 - 58, 25.03.2022
https://doi.org/10.18466/cbayarfbe.856119

Abstract

In today’s technology world, Virtual personal assistants (VPA) have become very common and most people have started making their homes smart using these VPAs. Although different companies have different assistants, Google Home Mini (GHM) will be our focus in this paper. The first device, Google Home, was released in November 2016 and then GHM was released after a year, in October 2017. GHM has many features such as playing music, setting reminders, setting kitchen timer and controlling smart home devices. Although GHM might be reliable against cyber-attacks, devices, which are paired with GHM, could be attacked and these cyber-attacks can lead to severe problems. Cyber-attack issues become more important to us, specifically if the devices controlled by GHM are vital devices such as oven, fire alarm, security camera. In this article, we will represent Denial of Service (DOS) attacks applied against devices which are paired with GHM. In this study, Bluedoser, L2ping, Bluetooth Dos Script which are software in Kali Linux platform were used in order to perform DoS attack and some devices were used such as Google Home Mini, Headphone, 2 speakers as victim device. Successful results were observed on Bluetooth headphone.

References

  • Zhang, N, Mi, X, Feng, X, Wang, X, Tian, Y, Qian, F. 2018. Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home. https://arxiv.org/pdf/1805.01525.pdf
  • Alrawi, O, Lever, C, Antonakakis, M, Monrose, F. 2019 SoK: Security Evaluation of Home-Based IoT Deployments. IEEE Symposium on Security and Privacy. San Francisco, Ca. 20-22 May 2019. Doi:10.1109/SP.2019.00013
  • Park, M, James JI. 2018. Preliminary Study of a Google Home Mini. Journal of Digital Forensics 2018 June, 12(1). https://arxiv.org/pdf/2001.04574
  • Caputo, D, Verderame, L, Ranieri, A, Merlo, A, & Caviglione, L. 2020. Fine- hearing Google Home: why silence will not protect your privacy. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 11(1), 35-53. https://doi.org/10.22667/JOWUA.2020.03.31.035
  • Çepik, H, Aydın, Ö, Dalkılıç, G. 2020. Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device. 7th International Management Information Systems Conference. İzmir, Turkey. 09-11.12.2020.
  • Google Nest, https://en.wikipedia.org/wiki/Google_Nest_(smart_speakers) (accessed at 07.01.2021).
  • Google Home specifications. Google Home Help. Google. Retrieved December 6, 2017.
  • Demmitt, J. 2015. "Google's Nest Labs plans top secret project at new Seattle engineering center". Geekwire.
  • Statt, N, Bohn, D. 2019. Google Nest: Why Google finally embraced Nest as its smart home brand". The Verge. Retrieved October 9, 2019.
  • Blynk. http://www.blynk.cc/. (accessed at 07.01.2021).
  • Mills, D. 1995. Simple network time protocol (SNTP). RFC 1769, University of Delaware. https://www.hjp.at/doc/rfc/rfc1769.html. (accessed at 07.01.2021).
  • Uy, M. 2020. Bluetooth Basics. Lifewire web site. Retrieved from https://www.lifewire.com/what-is-bluetooth-2377412, (accessed at 07.01.2021).
  • Imperva 2020. Ping of Death (POD). Imperva, Inc. Web site. Retrived from https://www.imperva.com/learn/ddos/ping-of-death/, (accessed at 07.01.2021).
  • Huegen, C. A. 1998. Network-Based Denial of Service Attacks. IEEE Transactions on Information Theory.
  • Singh, A. 2013. Instant Kali Linux. Packt Publishing Ltd.
  • l2ping, https://linux.die.net/man/1/l2ping (accessed at 07.01.2021).
  • https://github.com/Anlos0023/bluedoser (accessed at 07.01.2021).
  • Bluetooth Dos Attack Script, https://github.com/crypt0b0y/BLUETOOTH-DOS-ATTACK-SCRIPT (accessed at 07.01.2021).
  • Debian, https://en.wikipedia.org/wiki/Debian (accessed at 07.01.2021).
  • Blues, http://www.bluez.org/ (accessed at 07.01.2021).
  • HciTool, https://linux.die.net/man/1/hcitool (accessed at 07.01.2021).
There are 21 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Articles
Authors

Tuğrul Yüksel 0000-0001-9863-5853

Ömer Aydın 0000-0002-7137-4881

Gökhan Dalkılıç 0000-0002-0130-1716

Publication Date March 25, 2022
Published in Issue Year 2022 Volume: 18 Issue: 1

Cite

APA Yüksel, T., Aydın, Ö., & Dalkılıç, G. (2022). Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini. Celal Bayar Üniversitesi Fen Bilimleri Dergisi, 18(1), 53-58. https://doi.org/10.18466/cbayarfbe.856119
AMA Yüksel T, Aydın Ö, Dalkılıç G. Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini. CBUJOS. March 2022;18(1):53-58. doi:10.18466/cbayarfbe.856119
Chicago Yüksel, Tuğrul, Ömer Aydın, and Gökhan Dalkılıç. “Performing DoS Attacks on Bluetooth Devices Paired With Google Home Mini”. Celal Bayar Üniversitesi Fen Bilimleri Dergisi 18, no. 1 (March 2022): 53-58. https://doi.org/10.18466/cbayarfbe.856119.
EndNote Yüksel T, Aydın Ö, Dalkılıç G (March 1, 2022) Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini. Celal Bayar Üniversitesi Fen Bilimleri Dergisi 18 1 53–58.
IEEE T. Yüksel, Ö. Aydın, and G. Dalkılıç, “Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini”, CBUJOS, vol. 18, no. 1, pp. 53–58, 2022, doi: 10.18466/cbayarfbe.856119.
ISNAD Yüksel, Tuğrul et al. “Performing DoS Attacks on Bluetooth Devices Paired With Google Home Mini”. Celal Bayar Üniversitesi Fen Bilimleri Dergisi 18/1 (March 2022), 53-58. https://doi.org/10.18466/cbayarfbe.856119.
JAMA Yüksel T, Aydın Ö, Dalkılıç G. Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini. CBUJOS. 2022;18:53–58.
MLA Yüksel, Tuğrul et al. “Performing DoS Attacks on Bluetooth Devices Paired With Google Home Mini”. Celal Bayar Üniversitesi Fen Bilimleri Dergisi, vol. 18, no. 1, 2022, pp. 53-58, doi:10.18466/cbayarfbe.856119.
Vancouver Yüksel T, Aydın Ö, Dalkılıç G. Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini. CBUJOS. 2022;18(1):53-8.