Paper 2024/874

Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication

Marc Fischlin, Technische Universität Darmstadt
Olga Sanina, Technische Universität Darmstadt
Abstract

The Bluetooth protocol for wireless connection between devices comes with several security measures to protect confidentiality and integrity of data. At the heart of these security protocols lies the Secure Simple Pairing, wherewith the devices can negotiate a shared key before communicating sensitive data. Despite the good intentions, the Bluetooth security protocol has repeatedly been shown to be vulnerable, especially with regard to active attacks on the Secure Simple Pairing. We propose here a mechanism to limit active attacks on the Secure Connections protocol (the more secure version of the Secure Simple Pairing protocol), without infringing on the current Bluetooth protocol stack specification. The idea is to run an authentication protocol, like a classical challenge-response step for certified keys, within the existing infrastructure, even at a later, more convenient point in time. We prove that not only does this authentication step ensure freshness of future encryption keys, but an interesting feature is that it—a posteriori—also guarantees security of previously derived encryption keys. We next argue that this approach indeed prevents a large set of known attacks on the Bluetooth protocol.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Major revision. ACM CCS 2024
Keywords
BluetoothKey ExchangeSecure ConnectionsAuthenticationDeferrable Outside First Use (DOFU)
Contact author(s)
marc fischlin @ cryptoplexity de
olga sanina @ cryptoplexity de
History
2024-06-05: approved
2024-06-01: received
See all versions
Short URL
https://ia.cr/2024/874
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/874,
      author = {Marc Fischlin and Olga Sanina},
      title = {Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication},
      howpublished = {Cryptology ePrint Archive, Paper 2024/874},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/874}},
      url = {https://eprint.iacr.org/2024/874}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.