系统仿真学报 ›› 2016, Vol. 28 ›› Issue (6): 1412-1419.

• 仿真系统与技术 • 上一篇    下一篇

基于哈希链的BLE密钥协商方案设计

黄艺波, 黄一才, 郁滨   

  1. 解放军信息工程大学,河南 郑州 450004
  • 收稿日期:2015-05-02 修回日期:2015-07-21 出版日期:2016-06-08 发布日期:2020-06-08
  • 作者简介:黄艺波(1990-),男,河南洛阳,硕士生,研究方向为蓝牙、信息安全技术;黄一才(1985-),男,土家,湖北巴东,硕士,讲师,研究方向为蓝牙、信息安全技术等;郁滨(1964-),男,河南郑州,博士,教授,博导,研究方向为信息安全、无线网络安全技术、视觉密码等。

Design of BLE Key Agreement Scheme Based on Hash Chain

Huang Yibo, Huang Yicai, Yu Bin   

  1. PLA Information Engineering University, Zhengzhou 450004, China
  • Received:2015-05-02 Revised:2015-07-21 Online:2016-06-08 Published:2020-06-08

摘要: 针对低功耗蓝牙安全简单配对协议易受到窃听攻击和中间人攻击的问题,将哈希链引入低功耗蓝牙配对过程,提出了一种基于哈希链的低功耗蓝牙密钥协商方案。该方案利用哈希链的单向性和抗碰撞性实现了设备间的双向认证及链路密钥协商,同时设计哈希链更新机制,防止哈希链节点值的重复使用所带来的安全威胁。BAN逻辑安全性分析和实验结果表明,方案具有较好的安全特性,能够有效抵御窃听、中间人等攻击,同时具有较小的存储和计算开销。

关键词: 低功耗蓝牙, 哈希链, 密钥协商, 窃听攻击, 中间人攻击

Abstract: Aiming at the problem that BLE Secure Simple Pairing protocol is vulnerable to eavesdropping and man-in-the-middle attacks, a BLE key agreement scheme based on hash chain was proposed. The scheme realized mutual authentication and link key agreement applying the unidirectivity and crashworthiness of hash chain. Update mechanism of the hash chain was designed to prevent from reuse of hash chain node values. The security analysis of BAN logic and experiment results show that, the scheme can effectively resist eavesdropping and man-in-the-middle attacks. Meanwhile, it has low storage and computation overheads.

Key words: BLE, hash chain, key agreement, eavesdropping attack, man-in-the-middle attack

中图分类号: