Abstract
Bluetooth Low Energy (BLE) is increasing in popularity. Many scientists are proposing it as a technique for contact tracing to combat COVID-19. Additionally, BLE is being used in applications involving transferring sensitive information such as home security systems. This paper provides a new authentication solution for BLE with enhanced privacy, but minimal impact on energy consumption. We also provided a framework to demonstrate our protocol can be implemented on real devices, which support BLE modules, and can withstand typical types of cyberattacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ashton, K.: That “Internet of Things” thing. RFID J. 22, 97–114 (2009)
Barbareschi, M., De Benedictis, A., Mazzocca, N.: A PUF-based hardware mutual authentication protocol. J. Parallel Distrib. Comput. 119 (2018). https://doi.org/10.1016/j.jpdc.2018.04.007
Blazquez, A., Tsiatsis, V., Vandikas, K.: Performance evaluation of OpenID connect for an IoT information marketplace, pp. 1–6 (2015). https://doi.org/10.1109/VTCSpring.2015.7146004
Chae, C.J., Choi, K.N., Choi, K., Yae, Y.H., Shin, Y.: The extended authentication protocol using e-mail authentication in OAuth 2.0 protocol for secure granting of user access. J. Internet Comput. Serv. 16, 21–28 (2015). https://doi.org/10.7472/jksii.2015.16.1.21
Dang, T.K., Tran, K.T.K.: The meeting of acquaintances: a cost-efficient authentication scheme for light-weight objects with transient trust level and plurality approach. Secur. Commun. Netw. 2019, 8123259:1–8123259:18 (2019). https://doi.org/10.1155/2019/8123259
Delaune, S., Kremer, S., Ryan, M.D., Steel, G.: A formal analysis of authentication in the TPM. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 111–125. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19751-2_8
Emerson, S., Choi, Y.K., Hwang, D.Y., Kim, K.S., Kim, K.H.: An OAuth based authentication mechanism for IoT networks, pp. 1072–1074 (2015). https://doi.org/10.1109/ICTC.2015.7354740
Ferrag, M.A., Maglaras, L., Derhab, A.: Authentication and authorization for mobile IoT devices using biofeatures: recent advances and future trends. Secur. Commun. Netw. 2019 (2019). https://doi.org/10.1155/2019/5452870
Gartner: Leading the IoT (2018). https://www.gartner.com/imagesrv/books/iot/iotEbook_digital.pdf
Gershenfeld, N.: When Things Start to Think. Hodder & Stoughton, London (1999). https://books.google.it/books?id=y2SPPwAACAAJ
IHS: Internet of things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions) (2018). https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
Kothmayr, T., Schmitt, C., Hu, W., Bruenig, M., Carle, G.: DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw. 11 (2013). https://doi.org/10.1016/j.adhoc.2013.05.003
El-hajj, M., Fadlallah, A., Chamoun, M., Serhrouchni, A.: A survey of Internet of Things (IoT) authentication schemes. https://www.mdpi.com/1424-8220/19/5/1141/htm
Thamrin, M.N., Ahmad, I., Khalil-Hani, M.: A true random number generator for crypto embedded systems (2006)
Mahalle, P., Anggorojati, B., Prasad, N., Rangistty, N.: Identity authentication and capability based access control (IACAC) for the internet of things. J. Cyber Secur. Mobility 1, 309–348 (2012)
Salman, O., Abdallah, S., Elhajj, I., Chehab, A., Kayssi, A.: Identity-based authentication scheme for the Internet of Things, pp. 1109–1111 (2016). https://doi.org/10.1109/ISCC.2016.7543884
Santos, G., Guimaraes, V., Rodrigues, G., Granville, L., Tarouco, L.: A DTLS-based security architecture for the Internet of Things, pp. 809–815 (2015). https://doi.org/10.1109/ISCC.2015.7405613
Sig, B.: Bluetooth 5 (2018). https://www.bluetooth.com/~/media/files/marketing/bluetooth_5-final.ashxla=en
Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., Kikiras, P.: On the security and privacy of Internet of Things architectures and systems. In: 2015 International Workshop on Secure Internet of Things (SIoT), pp. 49–57 (2015). https://doi.org/10.1109/SIOT.2015.9
Acknowledgment
This research is funded by Vietnam National University Ho Chi Minh City(VNU-HCM) under grant number B2018-20-08. We also thank other members of the project, specially Chau D. M. Pham, for their meaningful help and comments during this paper preparation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Nguyen, T.L.P., Dang, T.K., Dang, T.T., Nguyen Thi, A.T. (2020). A Three-Way Energy Efficient Authentication Protocol Using Bluetooth Low Energy. In: Dang, T.K., Küng, J., Takizawa, M., Chung, T.M. (eds) Future Data and Security Engineering. FDSE 2020. Lecture Notes in Computer Science(), vol 12466. Springer, Cham. https://doi.org/10.1007/978-3-030-63924-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-63924-2_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-63923-5
Online ISBN: 978-3-030-63924-2
eBook Packages: Computer ScienceComputer Science (R0)