Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure

被引:40
|
作者
Sun, Da-Zhi [1 ,2 ,3 ]
Mu, Yi [3 ]
Susilo, Willy [3 ]
机构
[1] Tianjin Univ, Sch Comp Sci & Technol, TANK, Tianjin Key Lab Adv Networking, 135 Yaguan Rd,Tianjin Haihe Educ Pk, Tianjin 300350, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[3] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW 2522, Australia
关键词
Bluetooth standard; Secure Simple Pairing; Passkey entry; Man-in-the-middle attack; Home network system; USER AUTHENTICATION SCHEME; WIRELESS SENSOR NETWORKS; VULNERABILITIES; PROTOCOL;
D O I
10.1007/s00779-017-1081-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bluetooth devices are widely employed in the home network systems. It is important to secure the home members' Bluetooth devices, because they always store and transmit personal sensitive information. In the Bluetooth standard, Secure Simple Pairing (SSP) is an essential security mechanism for Bluetooth devices. We examine the security of SSP in the recent Bluetooth standard V5.0. The passkey entry association model in SSP is analyzed under the man-in-the-middle (MITM) attacks. Our contribution is twofold. (1) We demonstrate that the passkey entry association model is vulnerable to the MITM attack, once the host reuses the passkey. (2) An improved passkey entry protocol is therefore designed to fix the reusing passkey defect in the passkey entry association model. The improved passkey entry protocol can be easily adapted to the Bluetooth standard, because it only uses the basic cryptographic components existed in the Bluetooth standard. Our research results are beneficial to the security enhancement of Bluetooth devices in the home network systems.
引用
收藏
页码:55 / 67
页数:13
相关论文
共 21 条