IO Trust: A Mobile Security Framework for Real-Time BLE Device Authentication and Threat Detection in IoT Environments
IO Trust: A Mobile Security Framework for Real-Time BLE Device Authentication and Threat Detection in IoT Environments
Authors:
D.KarthikeyanReddy1, S.Vikram2, G.Prashanth3, D.Pavan4, K.VarunReddy5, Mrs.P.Jhansi Rani6
Student1-5, BTech (CSE) From Sphoorthy Engineering College, Hyderabad.
Assistant Professor 6, Dep of CSE, Sphoorthy Engineering College, Hyderabad.
Abstract—The rapid expansion of Bluetooth Low Energy (BLE) devices in IoT ecosystems has created significant security challenges, including device cloning, unauthorized tracking, and man-in-the-middle attacks. Current mobile operating systems prioritize connectivity over security verification, leaving users vulnerable to malicious devices. This paper presents IO Trust, a comprehensive mobile security framework that implements a Zero-Trust architecture for real-time BLE device assessment. The system employs a multi-factor trust scoring engine that analyzes hardware fingerprints, signal patterns, timing characteristics, service topology, and behavioral indicators to determine device legitimacy. A dual-layer scanning architecture combines immediate evaluation with deep security analysis, enabling realtime threat detection while maintaining comprehensive security coverage. Experimental evaluation across 500+ device encounters demonstrates 96.8% accuracy in clone detection, 94.2% precision in device classification, and average processing latency of 187ms per device. The system successfully identified various attack vectors including device cloning, MAC spoofing, and malicious tracking devices with 98% true positive rate and 2.3% false positive rate. IO Trust provides a practical, deployable solution for consumer-level BLE security assessment, addressing critical gaps in existing mobile security infrastructure while maintaining real-time performance on commodity mobile devices.
Index Terms—Bluetooth Low Energy, IoT Security, Zero Trust Architecture, Device Authentication, Threat Detection, Mobile Security, Real-time Analysis