Although BLE-SC pairing employs well-studied cryptographic primitives to guarantee its security, a recent study revealed a logic flaw in the protocol. To prevent the attack, we propose and analyze an effective countermeasure.īluetooth Low Energy (BLE) is the mainstream Bluetooth standard and BLE Secure Connections (BLC-SC) pairing is a protocol that authenticates two Bluetooth devices and derives a shared secret key between them. For the Stretch-and-Advance attack, we show analytically that the current proposal of IEEE 802.15.4ab allows reductions of over 90 m. We demonstrate Mix-Down on commercial chips and achieve distance reductions from 10 m to 0 m. We present Mix-Down and Stretch-and-Advance, two novel attacks against the current (IEEE 802.15.4z) and the upcoming (IEEE 802.15.4ab) UWB standard, respectively. In this paper, we identify transceiver clock imperfections as a new, important parameter that has been widely ignored so far. However, several publications in the recent past have shown that it is difficult to protect the integrity of distance measurements on the physical layer. UWB chips have been integrated into consumer electronics and considered for security-relevant use cases, such as access control or contactless payments. ![]() Comprehensive USRP experiments confirm that PhyAuth can efficiently detect fake packets with very low false-positive and false-negative rates while having a negligible negative impact on normal data transmissions.ĭue to its suitability for wireless ranging, Ultra-Wide Band (UWB) has gained traction over the past years. In addition, PhyAuth involves lightweight PHY signal processing and no change to the ZigBee protocol stack. PhyAuth provides three schemes to embed, detect, and verify POTPs based on different features of ZigBee PHY signals. An authentic POTP serves as the transmitter's PHY transmission permission for the corresponding packet. The key idea of PhyAuth is to let each ZigBee transmitter embed into its PHY signals a PHY one-time password (called POTP) derived from a device-specific secret key and an efficient cryptographic hash function. In this paper, we present PhyAuth, a PHY hop-by-hop message authentication framework to defend against packet-injection attacks in ZigBee networks. ![]() Since each ZigBee network uses hop-by-hop network-layer message authentication based on a common network key, it is highly vulnerable to packet-injection attacks, in which the adversary exploits the compromised network key to inject arbitrary fake packets from any spoofed address to disrupt network operations and consume the network/device resources. ![]() ZigBee is a popular wireless communication standard for Internet of Things (IoT) networks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |