International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |


TITLE BlueHunt: A Forensic Framework for Detecting Rogue Bluetooth and IoT Devices in Sensitive Environments
ABSTRACT BlueHunt is a passive framework to detect rogue Bluetooth and IoT devices in sensitive environments. BlueHunt features real-time Bluetooth Low Energy (BLE) scanning, manufacturer identification based on IEEE OUI numbers, a threat scoring engine, and an Isolation Forest machine learning model to detect rogue devices in real time. The system uses a Flask-SocketIO web dashboard to provide monitoring of rogue devices, management of alerts and whitelists, and generation of forensic reports of detected devices. Experimental results show that BlueHunt can detect 100% of rogue devices in a sensor network with zero false positives for high-risk device classifications.
AUTHOR MADHUMITHA M, SANKARA NARAYANAN S T M.Sc. Cyber Forensics & Information Security, Dept. of Cyber Security, Dr. M.G.R. Educational and Research Institute, Maduravoyal, Chennai, Tamil Nadu, India Assistant Professor, Dept. of ISDF, Center of Excellence in Digital Forensics, Perungudi, Chennai, Tamil Nadu, India
VOLUME 184
DOI DOI: 10.15680/IJIRCCE.2026.1405040
PDF pdf/40_BlueHunt A Forensic Framework for Detecting Rogue Bluetooth and IoT Devices in Sensitive Environments.pdf
KEYWORDS
References [1] J. Becker, N. Asokan, and J. Bhatt, "Tracking Anonymized Bluetooth Devices," Proceedings on Privacy Enhancing Technologies, vol. 2019, no. 3, pp. 5-21, Jul. 2019.
[2] K. Fawaz, K. H. Kim, and K. G. Shin, "Protecting Privacy of BLE Device Users," in Proc. 25th USENIX Security Symposium, Austin, TX, USA, Aug. 2016, pp. 1205-1221.
[3] M. Ryan, "Bluetooth: With Low Energy Comes Low Security," in Proc. USENIX Workshop on Offensive Technologies (WOOT), Washington, D.C., USA, Aug. 2013.
[4] A. Das, N. Borisov, and M. Caesar, "Do You Hear What I Hear? Fingerprinting Smartphones Through Embedded Sensors," in Proc. ACM CCS, Scottsdale, AZ, USA, Nov. 2014, pp. 441-452.
[5] F. T. Liu, K. M. Ting, and Z. H. Zhou, "Isolation Forest," in Proc. IEEE International Conference on Data Mining (ICDM), Pisa, Italy, Dec. 2008, pp. 413-422.
[6] T. Chen, X. Gao, and G. Chen, "The Application of Classification Methods to Detect Network Intrusions," in Proc. IEEE International Conference on Big Data, Washington, D.C., USA, 2016, pp. 1291-1299.
[7] A. K. Sikder, G. Petracca, H. Aksu, T. Jaeger, and A. S. Uluagac, "A Survey on Sensor-based Threats to Internet-of-Things Devices and Applications," IEEE Communications Surveys and Tutorials, vol. 23, no. 2, pp. 1125-1159, 2021.
[8] S. Sciancalepore, G. Oligeri, and R. Di Pietro, "ROGUE: Rogue Access Point Detection Using Randomness," in Proc. ACM WiSec, Boston, MA, USA, Jul. 2017, pp. 168-178.
[9] M. Kershaw, "Kismet Wireless Network Detector," [Online]. Available: https://www.kismetwireless.net. [Accessed: Mar. 2026].
[10] Bluelog, "Bluetooth Scanner and Logger," [Online]. Available: https://github.com/MS3FGX/Bluelog. [Accessed: Mar. 2026].
image
Copyright © IJIRCCE 2020.All right reserved