Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/511
Full metadata record
DC FieldValueLanguage
dc.rights.licenseAll Open Access, Green-
dc.contributor.authorGupta C.en_US
dc.contributor.authorVarshney G.en_US
dc.date.accessioned2023-11-30T08:39:45Z-
dc.date.available2023-11-30T08:39:45Z-
dc.date.issued2023-
dc.identifier.issn0140-3664-
dc.identifier.otherEID(2-s2.0-85145975577)-
dc.identifier.urihttps://dx.doi.org/10.1016/j.comcom.2023.01.001-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/511-
dc.description.abstractBluetooth Low Energy (BLE) devices have become very popular because of their Low energy consumption and prolonged battery life. They are being used in smart wearable devices, home automation systems, beacons, and many more areas. BLE uses pairing mechanisms to achieve a level of peer entity authentication as well as encryption. Although there are a set of pairing mechanisms available, BLE devices with no keyboard or display mechanism (and hence using the Just Works pairing) are still vulnerable. In this paper, we propose and implement a light-weight digital certificate-based authentication mechanism for the BLE devices using the Just Works model. The proposed model is an add-on to the existing pairing mechanism and can be easily incorporated into the existing BLE stack. To counter the Man-in-The-Middle attack scenario in Just Works pairing (device spoofing), our proposed model allows the client and peripheral to use the popular Public Key Infrastructure (PKI) to establish peer entity authentication and a secure cryptographic tunnel for communication. We have also developed a light-weight BLE profiled digital certificate containing the bare minimum fields required for resource-constrained devices, which significantly reduces the memory (about 90% reduction) and energy consumption. We have experimentally evaluated the device's energy consumption and execution time using the proposed pairing mechanism to demonstrate that the model can be easily deployed with fewer changes to the power requirements of the chips. The model has been formally verified using an automatic verification tool for protocol testing. © 2023 Elsevier B.V.en_US
dc.language.isoenen_US
dc.publisherElsevier B.V.en_US
dc.sourceComputer Communicationsen_US
dc.subjectAuthenticationen_US
dc.subjectBluetooth Low Energyen_US
dc.subjectElliptic curve cryptographyen_US
dc.subjectEnergy consumptionen_US
dc.subjectInternet of Thingsen_US
dc.subjectJust Worksen_US
dc.subjectMemory usageen_US
dc.subjectPairingen_US
dc.subjectPublic Key Infrastructureen_US
dc.titleAn improved authentication scheme for BLE devices with no I/O capabilitiesen_US
dc.typeJournal Articleen_US
Appears in Collections:Journal Article

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.