Journal of System Simulation ›› 2016, Vol. 28 ›› Issue (6): 1412-1419.

Previous Articles     Next Articles

Design of BLE Key Agreement Scheme Based on Hash Chain

Huang Yibo, Huang Yicai, Yu Bin   

  1. PLA Information Engineering University, Zhengzhou 450004, China
  • Received:2015-05-02 Revised:2015-07-21 Online:2016-06-08 Published:2020-06-08

Abstract: Aiming at the problem that BLE Secure Simple Pairing protocol is vulnerable to eavesdropping and man-in-the-middle attacks, a BLE key agreement scheme based on hash chain was proposed. The scheme realized mutual authentication and link key agreement applying the unidirectivity and crashworthiness of hash chain. Update mechanism of the hash chain was designed to prevent from reuse of hash chain node values. The security analysis of BAN logic and experiment results show that, the scheme can effectively resist eavesdropping and man-in-the-middle attacks. Meanwhile, it has low storage and computation overheads.

Key words: BLE, hash chain, key agreement, eavesdropping attack, man-in-the-middle attack

CLC Number: