Security analysis of Bluetooth Secure Simple Pairing protocols with extended threat model

被引:2
|
作者
Yin, Haotian [1 ]
机构
[1] Taiyuan Univ Technol, Coll Data Sci, 209 Daxue St, Jin Zhong 030600, Shanxi, Peoples R China
关键词
Bluetooth; Authentication; Secure Simple Pairing; Security model; Out of band channel; KEY EXCHANGE; CHANNELS;
D O I
10.1016/j.jisa.2022.103385
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, Bluetooth technology has become the primary means of short-distance. In the Bluetooth protocol stack, the Secure Simple Pairing (SSP) specifies three methods to provide authentication, Out-of-Band, Numeric Comparison, and Passkey Entry. All three schemes require extra or additional channel assistance in addition to the Bluetooth wireless channel during the authentication process. At the same time, attacks against the Bluetooth pairing protocol have gradually increased, and some attacks (e.g., Tap'n Ghost) targeting those extra channels have attracted the attention of the Bluetooth Association. Current attacks place new demands on Bluetooth SSP security and thus require new models to formalize these threats. Troncoso and Hale proposed the CYBORG model to address this challenge by modeling the channel between users and devices in detail and defining rich attacker capabilities and freshness rules. They also proposed an improved Passkey Entry protocol, Dual-Passkey Entry. However, the CYBORG model does not cover current attacks and threats as they claim, and it only focused on the Passkey Entry protocol. We formalized the threat models to clarify and bridge the gaps in the protocol design and practical requirements of the original CYBORG model. Attackers of Confidential -and Authenticated-extra channels are designed to deal with the settings in threats and protocol requirements. The analysis results show weaknesses and insecurities of SSP protocols.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Browser model for security analysis of browser-based protocols
    Gross, T
    Pfitzmann, B
    Sadeghi, AR
    COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 489 - 508
  • [43] Model-based Security Analysis Are you really secure?
    Wolf, Jan
    Siemers, Christian
    Schiller, Frank
    ATP MAGAZINE, 2021, (11-12): : 72 - 81
  • [44] Automatically constructing counter-examples of security protocols based on the extended horn logic model
    Zhou, Ti
    Li, Mengjun
    Li, Zhoujun
    Chen, Huowang
    2007, Science Press, 18,Shuangqing Street,Haidian, Beijing, 100085, China (44):
  • [45] A Security Threat Analysis and Evaluation Model for Power Field Operation Terminal
    Li, Nige
    Xu, Min
    Chen, Mu
    Chen, Lu
    2017 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2017), 2017, : 382 - 385
  • [46] Secure Communication Guarantees for Diverse Extended-Reality Applications: A Unified Statistical Security Model
    Xiao, Yuquan
    Du, Qinghe
    Cheng, Wenchi
    Lu, Nan
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2023, 17 (05) : 1007 - 1021
  • [47] Security analysis on "Strongly secure certificateless key-insulated signature secure in the standard model"
    Wang, Feng
    Xu, Li
    Pan, Jeng-Shyang
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 195 - 198
  • [48] Security analysis of two unbalancing pairing-free identity-based authenticated key exchange protocols
    Cheng, Qingfeng
    Li, Yuting
    Jiang, Qi
    Li, Xiong
    International Journal of Network Security, 2020, 22 (04): : 597 - 601
  • [49] SAT-based model-checking for security protocols analysis
    Alessandro Armando
    Luca Compagna
    International Journal of Information Security, 2008, 7 : 3 - 32
  • [50] Using Automated Model Analysis for Reasoning about Security of Web Protocols
    Kumar, Apurva
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 289 - 298