||A Secure Authentication Protocol against the Co-located App Attack in BLE
||(Ali Raza) ; (Safiullah Khan) ; (Seong Oun Hwang)
|| BLE; Secure bonding; Security; CP-ABE cryptography; ECC
||Bluetooth Low Energy (BLE) is used for periodic transmission of smaller data packages called attributes. BLE remains in sleep mode at all times except when participating in a data exchange, which reduces overall energy consumption. For secure communication, BLE devices need to pair first. The pairing has two or three phases. We say two or three phases because the third phase is optional and happens only if the devices are going to bond. The second pairing phase is made using a secure pairing scheme, but the third phase remains vulnerable to an attack named the co-located application (app) attack: a malicious app gets the same level of access to the paired protected data as the legitimate app. We provide an authentication protocol to mitigate this attack. Furthermore, we analyze the security of BLE communications after bonding, with or without our proposed protocol. Moreover, we also analyze the efficiency of the proposed protocol, and conclude that our proposed scheme makes BLE communications secure against the co-located app attack and is efficient enough to be practical.