Security Enhancement of Wireless Sensor Networks Using Signal Intervals

被引:2
作者
Moon, Jaegeun [1 ]
Jung, Im Y. [1 ]
Yoo, Jaesoo [2 ]
机构
[1] Kyungpook Natl Univ, Sch Elect Engn, 80 Daehakro, Daegu 702701, South Korea
[2] Chungbuk Natl Univ, Sch Informat & Commun Engn, 1 Chungdaero, Cheongju 28644, South Korea
关键词
IoT; wireless sensor network; WPAN; Bluetooth; simple secure pairing; signal interval;
D O I
10.3390/s17040752
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.
引用
收藏
页数:17
相关论文
共 35 条
  • [1] On Constrained Randomized Quantization
    Akyol, Emrah
    Rose, Kenneth
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (13) : 3291 - 3302
  • [2] [Anonymous], 2008, P 1 INT C MOBILE WIR
  • [3] [Anonymous], 2009, THESIS
  • [4] Barnickel J., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P17, DOI 10.1109/TrustCom.2012.182
  • [5] Biswas S., 2007, P COMM NETW CHIN SHA, P301
  • [6] Bluetooth Special Interest Group, 2014, BLUET COR SPEC VERS
  • [7] A Secure Authentication Scheme for Bluetooth Connection
    Diallo, A. S.
    Wajdi, A.
    Olanrewaju, R. F.
    Sado, F.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2014, : 60 - 63
  • [8] Eliasson J, 2006, CONSUM COMM NETWORK, P336
  • [9] Evans D., 2011, CISCO
  • [10] Forouzan B. A., 2008, CRYPTOGRAPHY NETWORK, P449