SIMULATION MODELING OF CONFLICT INTERACTION OF BLE PACKETS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.30.997

Keywords:

luetooth Low Energy, simulation modeling, conflicting signal interaction, ESP32, HackRF One, nRF52840, integrity, availability, noise generator, interference, countermeasure, radio channel interference immunity.

Abstract

The article is devoted to reviewing the software-hardware method of simulating BLE packets in a saturated environment with the presence of interfering signals. The method combines an Android application, external BLE antennas based on ESP32-S3 and nRF52840, as well as the HackRF One SDR receiver, allowing you to form and study the interaction of informative and interfering radio signals in the 2.4 GHz range. The object of the study is the conflict interaction of radio signals in the BLE channel. The subject of the study is a method for modeling BLE packets with adjustable parameters and a methodology for experimentally investigating the impact of an interference generator on the quality of BLE packet reception. A BLE advertising source with parameters such as channel, interval, payload length, and transmission power has been developed. An orchestrator was also created using the Python programming language, which ensures the operation of a set of nRF52840 transmitters with the necessary preset parameters. The data from these transmitters is collected by two receivers: an external BLE antenna connected to an Android device and a SmartRF packet analyzer. A series of physical experiments was conducted without interference and in the presence of a broadband interference signal. It was demonstrated that for the Android receiver, the proportion of correctly received frames for short advertising packets (2–10 bytes) without interference is on average 68–78%, while for SmartRF it reaches 80–90%. When an interference signal is introduced, a significant (by an order of magnitude) decrease in the adequate channel bandwidth is observed, and a sharp increase in the number of “broken” packets, especially for extended BLE frames. Heat maps of the distribution of the number of received packets for nRF and SmartRF were constructed. The experiment was conducted using an independent spectrum analyzer built on the HackRF One SDR. The results can be used to assess the noise immunity of BLE systems and design a radio channel for IoT networks.

Downloads

Download data is not yet available.

References

Hulak, H., Zhyltsov, O., Kyrychok, R., Korshun, N., & Skladannyi, P. (2023). Enterprise Information and Cyber Security. [Textbook]. Borys Grinchenko Kyiv Metrop. Univ.

Kostiuk, Y., Skladannyi, P., Bebeshko, B., Khorolska, K., Rzaieva, S., & Vorokhob, M. (2025). Information and Communication Systems Security. [Textbook]. Borys Grinchenko Kyiv Metrop. Univ.

Kostiuk, Y., Skladannyi, P., Hulak, H., Bebeshko, B., Khorolska, K., & Rzaieva, S. (2025). Information Security Systems. [Textbook]. Borys Grinchenko Kyiv Metrop. Univ.

Sokolov, V., Skladannyi, P., & Astapenya, V. (2023). Bluetooth Low-Energy Beacon Resistance to Jamming Attack. In 2023 IEEE 13th Int. Conf. on Electronics and Information Technologies (ELIT) (pp. 270–274).

TajDini, M., Sokolov, V., & Buriachok, V. (2019). Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio. In 8th Int. Conf. on “Mathematics. Information Technologies. Education:” Modern Machine Learning Technologies and Data Science, vol. 2386 (pp. 287–296).

Pakanon, N., Chamchoy, M., & Supanakoon, P. (2020). Study on Accuracy of Trilateration Method for Indoor Positioning with BLE Beacons. In 2020 6th Int. Conf. on Engineering, Applied Sci. and Technol. https://doi.org/10.1109/ICEAST50382.2020.9165464

Ghamari, M., Villeneuve, E., Soltanpur, C., Khangosstar, J., Janko, B., Sherratt, R., & Harwin, W. (2018). Detailed Examination of a Packet Collision Model for Bluetooth Low Energy Advertising Mode. IEEE Access, 6, 46066–46073. https://doi.org/10.1109/access.2018.2866323

Kindt, P., Park, S., & Chakraborty, S. (2018). Fast Collision Simulation for Cyclic Wireless Protocols. ArXiv. https://doi.org/10.48550/arXiv.1807.01645

Raj, M., & Achuthan, K. (2022). Transmission Modeling and Attack Simulation of Bluetooth Low Energy. In 2022 2nd Int. Conf. on Interdisciplinary Cyber Physical Systems (ICPS) (pp. 93–98). https://doi.org/10.1109/icps55917.2022.00025

Shavelis, R., & Ozols, K. (2020). Bluetooth Low Energy Wireless Sensor Network Library in MATLAB Simulink. J. Sens. Actuator Netw., 9, 38. https://doi.org/10.3390/jsan9030038

Shan, G., Lee, B., Shin, S., & Roh, B. (2017). Design and Implementation of Simulator for Analysis of BLE Broadcast Signal Collision. In 2017 Int. Conf. on Information Networking (ICOIN) (pp. 448–452). https://doi.org/10.1109/icoin.2017.7899533

Nikodem, M., & Bawiec, M. (2019). Experimental Evaluation of Advertisement-based Bluetooth Low Energy Communication. Sensors, 20. https://doi.org/10.3390/s20010107

Nikodem, M., Słabicki, M., & Bawiec, M. (2020). Efficient Communication Scheme for Bluetooth Low Energy in Large Scale Applications. Sensors, 20. https://doi.org/10.3390/s20216371

Pang, B., Claeys, T., Vankeirsbilck, J., T’Jonck, K., Hallez, H., & Boydens, J. (2023). A Novel Model to Quantify the Impact of Transmission Parameters on the Coexistence Between Bluetooth Low Energy Pairs. IEEE Internet Things J., 10, 1733–1745. https://doi.org/10.1109/jiot.2022.3209874

Pang, B., T’Jonck, K., Claeys, T., Pissoort, D., Hallez, H., & Boydens, J. (2021). Bluetooth Low Energy Interference Awareness Scheme and Improved Channel Selection Algorithm for Connection Robustness. Sensors, 21. https://doi.org/10.3390/s21072257

Kim, M. (2017). An Analysis of Packet Collision Probability due to Inter-Piconet Interference in the Bluetooth Low Energy Networks. J. Inst, Electr. Eng. Korea, 54, 3–11. https://doi.org/10.5573/ieie.2017.54.8.3

Del-Valle-Soto, C., Valdivia, L., Velázquez, R., Del-Puerto-Flores, J., Varela-Aldás, J., & Visconti, P. (2025). Adaptive Jamming Mitigation for Clustered Energy-Efficient LoRa-BLE Hybrid Wireless Sensor Networks. Sensors, 25. https://doi.org/10.3390/s25061931

Park, W., Eo, S., Joo, C., & Bahk, S. (2024). B-Hop: Time-Domain Adjustment of BLE Frequency Hopping Against Wi-Fi Beacon Interference. IEEE Internet Things J., 11, 12853–12863. https://doi.org/10.1109/jiot.2023.3337252

Sokolov, V., Skladannyi, P., & Platonenko, A. (2022). Video Channel Suppression Method of Unmanned Aerial Vehicles. In 2022 IEEE 41st International Conference on Electronics and Nanotechnology (ELNANO) (pp. 473–477). https://doi.org/10.1109/elnano54667.2022.9927105

Sokolov, V., Skladannyi, P., & Korshun, N. (2023). ZigBee Network Resistance to Jamming Attacks. In 2023 IEEE Int. Conf. on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo) (pp. 161–165). https://doi.org/10.1109/ukrmico61577.2023.10380360

Sokolov, V., Skladannyi, P., & Mazur, N. (2023). Wi-Fi Repeater Influence on Wireless Access. In 2023 IEEE 5th Int. Conf. on Advanced Information and Communication Technologies (AICT) (pp. 33–36). https://doi.org/10.1109/aict61584.2023.10452421

Sokolov, V., Skladannyi, P., & Platonenko, A. (2023). Jump-Stay Jamming Attack on Wi-Fi Systems. In 2023 IEEE 18th Int. Conf. on Computer Science and Information Technologies (CSIT) (pp. 1–5). https://doi.org/10.1109/csit61576.2023.10324031

Sokolov, V., Skladannyi, P., & Astapenya, V. (2023). Wi-Fi Interference Resistance to Jamming Attack. In 2023 IEEE 5th Int. Conf. on Advanced Information and Communication Technologies (AICT) (pp. 1–4). https://doi.org/10.1109/aict61584.2023.10452687

Novytskyi, A., Sokolov, V., Kriuchkova, L., & Skladannyi, P. (2025). Determining the Error Distribution of BLE Beacons at Antenna Near and Far Fields. In 4th Int. Conf. on Cyber Hygiene & Conflict Management in Global Information Networks (CH&CMiGIN’2025), vol. 4024 (pp. 133–143).

Downloads


Abstract views: 19

Published

2025-10-26

How to Cite

Sokolov, V., Novytskyi, A., & Bodnenko, D. (2025). SIMULATION MODELING OF CONFLICT INTERACTION OF BLE PACKETS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(30), 662–681. https://doi.org/10.28925/2663-4023.2025.30.997

Most read articles by the same author(s)

1 2 > >>