International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |
| TITLE | BlueHunt: A Forensic Framework for Detecting Rogue Bluetooth and IoT Devices in Sensitive Environments |
|---|---|
| ABSTRACT | BlueHunt is a passive framework to detect rogue Bluetooth and IoT devices in sensitive environments. BlueHunt features real-time Bluetooth Low Energy (BLE) scanning, manufacturer identification based on IEEE OUI numbers, a threat scoring engine, and an Isolation Forest machine learning model to detect rogue devices in real time. The system uses a Flask-SocketIO web dashboard to provide monitoring of rogue devices, management of alerts and whitelists, and generation of forensic reports of detected devices. Experimental results show that BlueHunt can detect 100% of rogue devices in a sensor network with zero false positives for high-risk device classifications. |
| AUTHOR | MADHUMITHA M, SANKARA NARAYANAN S T M.Sc. Cyber Forensics & Information Security, Dept. of Cyber Security, Dr. M.G.R. Educational and Research Institute, Maduravoyal, Chennai, Tamil Nadu, India Assistant Professor, Dept. of ISDF, Center of Excellence in Digital Forensics, Perungudi, Chennai, Tamil Nadu, India |
| VOLUME | 184 |
| DOI | DOI: 10.15680/IJIRCCE.2026.1405040 |
| pdf/40_BlueHunt A Forensic Framework for Detecting Rogue Bluetooth and IoT Devices in Sensitive Environments.pdf | |
| KEYWORDS | |
| References | [1] J. Becker, N. Asokan, and J. Bhatt, "Tracking Anonymized Bluetooth Devices," Proceedings on Privacy Enhancing Technologies, vol. 2019, no. 3, pp. 5-21, Jul. 2019. [2] K. Fawaz, K. H. Kim, and K. G. Shin, "Protecting Privacy of BLE Device Users," in Proc. 25th USENIX Security Symposium, Austin, TX, USA, Aug. 2016, pp. 1205-1221. [3] M. Ryan, "Bluetooth: With Low Energy Comes Low Security," in Proc. USENIX Workshop on Offensive Technologies (WOOT), Washington, D.C., USA, Aug. 2013. [4] A. Das, N. Borisov, and M. Caesar, "Do You Hear What I Hear? Fingerprinting Smartphones Through Embedded Sensors," in Proc. ACM CCS, Scottsdale, AZ, USA, Nov. 2014, pp. 441-452. [5] F. T. Liu, K. M. Ting, and Z. H. Zhou, "Isolation Forest," in Proc. IEEE International Conference on Data Mining (ICDM), Pisa, Italy, Dec. 2008, pp. 413-422. [6] T. Chen, X. Gao, and G. Chen, "The Application of Classification Methods to Detect Network Intrusions," in Proc. IEEE International Conference on Big Data, Washington, D.C., USA, 2016, pp. 1291-1299. [7] A. K. Sikder, G. Petracca, H. Aksu, T. Jaeger, and A. S. Uluagac, "A Survey on Sensor-based Threats to Internet-of-Things Devices and Applications," IEEE Communications Surveys and Tutorials, vol. 23, no. 2, pp. 1125-1159, 2021. [8] S. Sciancalepore, G. Oligeri, and R. Di Pietro, "ROGUE: Rogue Access Point Detection Using Randomness," in Proc. ACM WiSec, Boston, MA, USA, Jul. 2017, pp. 168-178. [9] M. Kershaw, "Kismet Wireless Network Detector," [Online]. Available: https://www.kismetwireless.net. [Accessed: Mar. 2026]. [10] Bluelog, "Bluetooth Scanner and Logger," [Online]. Available: https://github.com/MS3FGX/Bluelog. [Accessed: Mar. 2026]. |