Cargando…

Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things

Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random addre...

Descripción completa

Detalles Bibliográficos
Autores principales: Cha, Shi-Cho, Yeh, Kuo-Hui, Chen, Jyun-Fu
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5677388/
https://www.ncbi.nlm.nih.gov/pubmed/29036900
http://dx.doi.org/10.3390/s17102348
_version_ 1783277233769545728
author Cha, Shi-Cho
Yeh, Kuo-Hui
Chen, Jyun-Fu
author_facet Cha, Shi-Cho
Yeh, Kuo-Hui
Chen, Jyun-Fu
author_sort Cha, Shi-Cho
collection PubMed
description Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim’s devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts.
format Online
Article
Text
id pubmed-5677388
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-56773882017-11-17 Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things Cha, Shi-Cho Yeh, Kuo-Hui Chen, Jyun-Fu Sensors (Basel) Article Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim’s devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts. MDPI 2017-10-14 /pmc/articles/PMC5677388/ /pubmed/29036900 http://dx.doi.org/10.3390/s17102348 Text en © 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Cha, Shi-Cho
Yeh, Kuo-Hui
Chen, Jyun-Fu
Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things
title Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things
title_full Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things
title_fullStr Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things
title_full_unstemmed Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things
title_short Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things
title_sort toward a robust security paradigm for bluetooth low energy-based smart objects in the internet-of-things
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5677388/
https://www.ncbi.nlm.nih.gov/pubmed/29036900
http://dx.doi.org/10.3390/s17102348
work_keys_str_mv AT chashicho towardarobustsecurityparadigmforbluetoothlowenergybasedsmartobjectsintheinternetofthings
AT yehkuohui towardarobustsecurityparadigmforbluetoothlowenergybasedsmartobjectsintheinternetofthings
AT chenjyunfu towardarobustsecurityparadigmforbluetoothlowenergybasedsmartobjectsintheinternetofthings