Abstract

Developing a New Security Framework for Bluetooth Low Energy Devices

Highlights

  • MotivationBluetooth Low Energy (BLE) is first introduced in 2010 as part of the Bluetooth specification 4, which has a remarkable capability to keep devices working for a long time (months to years [Nick (2015)])

  • Security issues related to wearable devices can occur in different aspects, that are challenging when considering a broad scenario of Internet of Things (IoT) devices such as a network of Medical Internet of Things (MIoT), as discussed in the survey paper by Sun et al [Sun, Cai, Li et al (2018)]

  • Before a session key (SK) is generated, we need to make sure that the same shared secret key (SSK) and the time value are shared by the client and the server; for this purpose, we design a new protocol called the “synchronizing time protocol”, whose sequence diagram is in Fig. 3, which is described as follows: 1. Each Generic Attribute Profile (GATT) server holds a unique and fixed public-private key pair of the Elliptic Curve Diffie-Hellman (ECDH) algorithm

Read more

Summary

Motivation

Bluetooth Low Energy (BLE) is first introduced in 2010 as part of the Bluetooth specification 4, which has a remarkable capability to keep devices working for a long time (months to years [Nick (2015)]). Paring and data encryption are not necessary in order to let two BLE devices connect with each other; doing so can save power consumption with the sacrifice of dropping security protection This could be a common case for the BLE wearable devices nowadays. In order to mitigate the disadvantages of the existing inconvenient or insecure pairing mechanisms, and to fix the vulnerabilities of the BLE based wearable devices, we decide to develop a security framework to protect the data transmitted via BLE. The security framework can be seen as a supplement to Bluetooth pairing mechanisms It can protect BLE based wearable devices that cannot fulfill the requirements of the Numeric Comparison method. Chang and Shmatikov [Chang and Shmatikov (2007)] presented a formal analysis of authentication of the Simple Pairing protocol of Bluetooth, using ProVerif

Related research
Architecture
Cryptography
Security goals and principles
Design of the synchronizing time protocol
Design of securely transmitting data
Advantage features
Compatibilities
Implementation of the security framework
Implementation of cryptography
Performance
Power consumption
Summary
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call