Security analysis of Bluetooth Secure Simple Pairing protocols with extended threat model

被引:2
|
作者
Yin, Haotian [1 ]
机构
[1] Taiyuan Univ Technol, Coll Data Sci, 209 Daxue St, Jin Zhong 030600, Shanxi, Peoples R China
关键词
Bluetooth; Authentication; Secure Simple Pairing; Security model; Out of band channel; KEY EXCHANGE; CHANNELS;
D O I
10.1016/j.jisa.2022.103385
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, Bluetooth technology has become the primary means of short-distance. In the Bluetooth protocol stack, the Secure Simple Pairing (SSP) specifies three methods to provide authentication, Out-of-Band, Numeric Comparison, and Passkey Entry. All three schemes require extra or additional channel assistance in addition to the Bluetooth wireless channel during the authentication process. At the same time, attacks against the Bluetooth pairing protocol have gradually increased, and some attacks (e.g., Tap'n Ghost) targeting those extra channels have attracted the attention of the Bluetooth Association. Current attacks place new demands on Bluetooth SSP security and thus require new models to formalize these threats. Troncoso and Hale proposed the CYBORG model to address this challenge by modeling the channel between users and devices in detail and defining rich attacker capabilities and freshness rules. They also proposed an improved Passkey Entry protocol, Dual-Passkey Entry. However, the CYBORG model does not cover current attacks and threats as they claim, and it only focused on the Passkey Entry protocol. We formalized the threat models to clarify and bridge the gaps in the protocol design and practical requirements of the original CYBORG model. Attackers of Confidential -and Authenticated-extra channels are designed to deal with the settings in threats and protocol requirements. The analysis results show weaknesses and insecurities of SSP protocols.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Bluetooth Secure Simple Pairing with enhanced security level
    Gajbhiye, Samta
    Karmakar, Sanjeev
    Sharma, Monisha
    Sharma, Sanjay
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 44 : 170 - 183
  • [2] Enhancing the Security of Numeric Comparison Secure Simple Pairing in Bluetooth 5.0
    Hou, Dongkun
    Zhang, Jie
    Man, Ka Lok
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1622 - 1629
  • [3] New Efficient RF Fingerprint-Based Security Solution for Bluetooth Secure Simple Pairing
    Pasanen, Sanna
    Haataja, Keijo
    Paivinen, Niina
    Toivanen, Pekka
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 2819 - 2826
  • [4] Security Enhanced Design of the Bluetooth Simple Pairing Protocol
    Xu, Guangliang
    Yu, Bin
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 292 - 296
  • [5] A Novel Secure Simple Bluetooth Pairing using Physical Vibration
    Min, Young-Jae
    Hwang, Byungjin
    Han, Youngsun
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [6] Analyzing the Secure Simple Pairing in Bluetooth v4.0
    Raphael C.-W. Phan
    Patrick Mingard
    Wireless Personal Communications, 2012, 64 : 719 - 737
  • [7] Analyzing the Secure Simple Pairing in Bluetooth v4.0
    Phan, Raphael C. -W.
    Mingard, Patrick
    WIRELESS PERSONAL COMMUNICATIONS, 2012, 64 (04) : 719 - 737
  • [8] Nino Man-In-The-Middle attack on Bluetooth Secure Simple Pairing
    Hypponen, Konstantin
    Haataja, Keijo M. J.
    2007 THIRD IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET, 2007, : 64 - 68
  • [9] Formal Analysis of Secure Device Pairing Protocols
    Nguyen, Trung
    Leneutre, Jean
    2014 IEEE 13TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA 2014), 2014, : 291 - 295
  • [10] Practical Man-In-The-Middle Attacks Against Bluetooth Secure Simple Pairing
    Haataja, Keijo
    Toivanen, Pekka
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4821 - 4825