Security analysis of Bluetooth Secure Simple Pairing protocols with extended threat model

被引:2
|
作者
Yin, Haotian [1 ]
机构
[1] Taiyuan Univ Technol, Coll Data Sci, 209 Daxue St, Jin Zhong 030600, Shanxi, Peoples R China
关键词
Bluetooth; Authentication; Secure Simple Pairing; Security model; Out of band channel; KEY EXCHANGE; CHANNELS;
D O I
10.1016/j.jisa.2022.103385
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, Bluetooth technology has become the primary means of short-distance. In the Bluetooth protocol stack, the Secure Simple Pairing (SSP) specifies three methods to provide authentication, Out-of-Band, Numeric Comparison, and Passkey Entry. All three schemes require extra or additional channel assistance in addition to the Bluetooth wireless channel during the authentication process. At the same time, attacks against the Bluetooth pairing protocol have gradually increased, and some attacks (e.g., Tap'n Ghost) targeting those extra channels have attracted the attention of the Bluetooth Association. Current attacks place new demands on Bluetooth SSP security and thus require new models to formalize these threats. Troncoso and Hale proposed the CYBORG model to address this challenge by modeling the channel between users and devices in detail and defining rich attacker capabilities and freshness rules. They also proposed an improved Passkey Entry protocol, Dual-Passkey Entry. However, the CYBORG model does not cover current attacks and threats as they claim, and it only focused on the Passkey Entry protocol. We formalized the threat models to clarify and bridge the gaps in the protocol design and practical requirements of the original CYBORG model. Attackers of Confidential -and Authenticated-extra channels are designed to deal with the settings in threats and protocol requirements. The analysis results show weaknesses and insecurities of SSP protocols.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
    Sun, Da-Zhi
    Mu, Yi
    Susilo, Willy
    PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (01) : 69 - 69
  • [22] Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
    Da-Zhi Sun
    Yi Mu
    Willy Susilo
    Personal and Ubiquitous Computing, 2018, 22 : 55 - 67
  • [23] Security Analysis of Out-of-Band Device Pairing Protocols: A Survey
    Khalfaoui, Sameh
    Leneutre, Jean
    Villard, Arthur
    Ma, Jingxuan
    Urien, Pascal
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [24] Develop secure database system with security extended ER model
    Liu, X
    Han, Z
    Liu, JQ
    Shen, CX
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 1005 - 1010
  • [25] Analysis of security requirements for cryptographic voting protocols (extended abstract)
    Cetinkaya, Orhan
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1451 - 1456
  • [26] Security Analysis of Secure Data Aggregation Protocols in Wireless Sensor Networks
    Rahayu, Triana Mugia
    Lee, Sang-Gon
    Lee, Hoon-Jae
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 471 - 474
  • [27] Automating the security analysis process of secure ad hoc routing protocols
    Andel, T. R.
    Back, G.
    Yasinsac, A.
    SIMULATION MODELLING PRACTICE AND THEORY, 2011, 19 (09) : 2032 - 2049
  • [28] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    Science in China(Series F:Information Sciences), 2004, (02) : 199 - 220
  • [29] Model Driven Security Analysis of IDaaS Protocols
    Kumar, Apurva
    SERVICE-ORIENTED COMPUTING, 2011, 7084 : 312 - 327
  • [30] Algebra model and security analysis for cryptographic protocols
    Jinpeng Huai
    Xianxian Li
    Science in China Series F: Information Sciences, 2004, 47 : 199 - 220