Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Three-Way Energy Efficient Authentication Protocol Using Bluetooth Low Energy

  • Conference paper
  • First Online:
Future Data and Security Engineering (FDSE 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12466))

Included in the following conference series:

  • 1046 Accesses

Abstract

Bluetooth Low Energy (BLE) is increasing in popularity. Many scientists are proposing it as a technique for contact tracing to combat COVID-19. Additionally, BLE is being used in applications involving transferring sensitive information such as home security systems. This paper provides a new authentication solution for BLE with enhanced privacy, but minimal impact on energy consumption. We also provided a framework to demonstrate our protocol can be implemented on real devices, which support BLE modules, and can withstand typical types of cyberattacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ashton, K.: That “Internet of Things” thing. RFID J. 22, 97–114 (2009)

    Google Scholar 

  2. Barbareschi, M., De Benedictis, A., Mazzocca, N.: A PUF-based hardware mutual authentication protocol. J. Parallel Distrib. Comput. 119 (2018). https://doi.org/10.1016/j.jpdc.2018.04.007

  3. Blazquez, A., Tsiatsis, V., Vandikas, K.: Performance evaluation of OpenID connect for an IoT information marketplace, pp. 1–6 (2015). https://doi.org/10.1109/VTCSpring.2015.7146004

  4. Chae, C.J., Choi, K.N., Choi, K., Yae, Y.H., Shin, Y.: The extended authentication protocol using e-mail authentication in OAuth 2.0 protocol for secure granting of user access. J. Internet Comput. Serv. 16, 21–28 (2015). https://doi.org/10.7472/jksii.2015.16.1.21

  5. Dang, T.K., Tran, K.T.K.: The meeting of acquaintances: a cost-efficient authentication scheme for light-weight objects with transient trust level and plurality approach. Secur. Commun. Netw. 2019, 8123259:1–8123259:18 (2019). https://doi.org/10.1155/2019/8123259

  6. Delaune, S., Kremer, S., Ryan, M.D., Steel, G.: A formal analysis of authentication in the TPM. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 111–125. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19751-2_8

    Chapter  Google Scholar 

  7. Emerson, S., Choi, Y.K., Hwang, D.Y., Kim, K.S., Kim, K.H.: An OAuth based authentication mechanism for IoT networks, pp. 1072–1074 (2015). https://doi.org/10.1109/ICTC.2015.7354740

  8. Ferrag, M.A., Maglaras, L., Derhab, A.: Authentication and authorization for mobile IoT devices using biofeatures: recent advances and future trends. Secur. Commun. Netw. 2019 (2019). https://doi.org/10.1155/2019/5452870

  9. Gartner: Leading the IoT (2018). https://www.gartner.com/imagesrv/books/iot/iotEbook_digital.pdf

  10. Gershenfeld, N.: When Things Start to Think. Hodder & Stoughton, London (1999). https://books.google.it/books?id=y2SPPwAACAAJ

  11. IHS: Internet of things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions) (2018). https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/

  12. Kothmayr, T., Schmitt, C., Hu, W., Bruenig, M., Carle, G.: DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw. 11 (2013). https://doi.org/10.1016/j.adhoc.2013.05.003

  13. El-hajj, M., Fadlallah, A., Chamoun, M., Serhrouchni, A.: A survey of Internet of Things (IoT) authentication schemes. https://www.mdpi.com/1424-8220/19/5/1141/htm

  14. Thamrin, M.N., Ahmad, I., Khalil-Hani, M.: A true random number generator for crypto embedded systems (2006)

    Google Scholar 

  15. Mahalle, P., Anggorojati, B., Prasad, N., Rangistty, N.: Identity authentication and capability based access control (IACAC) for the internet of things. J. Cyber Secur. Mobility 1, 309–348 (2012)

    Google Scholar 

  16. Salman, O., Abdallah, S., Elhajj, I., Chehab, A., Kayssi, A.: Identity-based authentication scheme for the Internet of Things, pp. 1109–1111 (2016). https://doi.org/10.1109/ISCC.2016.7543884

  17. Santos, G., Guimaraes, V., Rodrigues, G., Granville, L., Tarouco, L.: A DTLS-based security architecture for the Internet of Things, pp. 809–815 (2015). https://doi.org/10.1109/ISCC.2015.7405613

  18. Sig, B.: Bluetooth 5 (2018). https://www.bluetooth.com/~/media/files/marketing/bluetooth_5-final.ashxla=en

  19. Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., Kikiras, P.: On the security and privacy of Internet of Things architectures and systems. In: 2015 International Workshop on Secure Internet of Things (SIoT), pp. 49–57 (2015). https://doi.org/10.1109/SIOT.2015.9

Download references

Acknowledgment

This research is funded by Vietnam National University Ho Chi Minh City(VNU-HCM) under grant number B2018-20-08. We also thank other members of the project, specially Chau D. M. Pham, for their meaningful help and comments during this paper preparation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tran Khanh Dang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nguyen, T.L.P., Dang, T.K., Dang, T.T., Nguyen Thi, A.T. (2020). A Three-Way Energy Efficient Authentication Protocol Using Bluetooth Low Energy. In: Dang, T.K., Küng, J., Takizawa, M., Chung, T.M. (eds) Future Data and Security Engineering. FDSE 2020. Lecture Notes in Computer Science(), vol 12466. Springer, Cham. https://doi.org/10.1007/978-3-030-63924-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-63924-2_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-63923-5

  • Online ISBN: 978-3-030-63924-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics