Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy

被引:0
|
作者
Pei Cao
Chi Zhang
Xiang-Jun Lu
Hai-Ning Lu
Da-Wu Gu
机构
[1] Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering
关键词
Bluetooth low energy (BLE/BTLE); long term key; re-keying protocol; side-channel analysis;
D O I
暂无
中图分类号
学科分类号
摘要
In the era of the Internet of Things, Bluetooth low energy (BLE/BTLE) plays an important role as a well-known wireless communication technology. While the security and privacy of BLE have been analyzed and fixed several times, the threat of side-channel attacks to BLE devices is still not well understood. In this work, we highlight a side-channel threat to the re-keying protocol of BLE. This protocol uses a fixed long term key for generating session keys, and the leakage of the long term key could render the encryption of all the following (and previous) connections useless. Our attack exploits the side-channel leakage of the re-keying protocol when it is implemented on embedded devices. In particular, we present successful correlation electromagnetic analysis and deep learning based profiled analysis that recover long term keys of BLE devices. We evaluate our attack on an ARM Cortex-M4 processor (Nordic Semiconductor nRF52840) running Nimble, a popular open-source BLE stack. Our results demonstrate that the long term key can be recovered within only a small amount of electromagnetic traces. Further, we summarize the features and limitations of our attack, and suggest a range of countermeasures to prevent it.
引用
收藏
页码:1132 / 1148
页数:16
相关论文
共 50 条
  • [1] Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy
    Cao, Pei
    Zhang, Chi
    Lu, Xiang-Jun
    Lu, Hai-Ning
    Gu, Da-Wu
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2023, 38 (05) : 1132 - 1148
  • [2] Fresh Re-Keying with Strong PUFs: a New Approach to Side-Channel Security
    Xi, Xiaodan
    Aysu, Aydin
    Orshansky, Michael
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2018, : 118 - 125
  • [3] Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
    Medwed, Marcel
    Standaert, Francois-Xavier
    Grossschaedl, Johann
    Regazzoni, Francesco
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 279 - +
  • [4] Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions
    Padilla, Jonathan Martinez
    Meyer-Baese, Uwe
    Foo, Simon
    EURASIP JOURNAL ON INFORMATION SECURITY, 2018,
  • [5] EM Side-Channel Analysis of Data Leakage Near Embedded Bluetooth Low Energy Modules
    Iyer, Vishnuvardhan V.
    Yilmaz, Ali E.
    2023 IEEE WIRELESS AND MICROWAVE TECHNOLOGY CONFERENCE, WAMICON, 2023,
  • [6] A novel conference key distribution system with re-keying protocol
    Huang, HF
    Chang, CC
    WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET -RELATED SOCIAL ISSUES - HSI 2005, 2005, 3597 : 282 - 290
  • [7] Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
    Chevallier-Mames, B
    Ciet, M
    Joye, M
    IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (06) : 760 - 768
  • [8] A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security
    Abdullah, Maan Younis
    Hua, Gui Wei
    Alsharabi, Naif
    SENSORS, 2008, 8 (12) : 7866 - 7881
  • [9] A new group re-keying protocol with smaller computational and key storage overh
    Nemaney Pour, Alireza
    Kumekawa, Kazuya
    Kato, Toshihiko
    Itoh, Shuichi
    PROCEEDINGS OF THE FIFTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS, 2006, : 165 - +
  • [10] Increasing the lifetime of a key: A comparative analysis of the security of re-keying techniques
    Abdalla, M
    Bellare, M
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 546 - 559