Security Enhancement of Wireless Sensor Networks Using Signal Intervals

Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.

[1]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[2]  M. Mosleh,et al.  Notice of Violation of IEEE Publication PrinciplesA new secure scheme purposed for recognition and authentication protocol in Bluetooth environment , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[3]  Guofang Zhang,et al.  A System Architecture Design Scheme of the Secure Chip Based on SoC , 2009, 2009 International Workshop on Intelligent Systems and Applications.

[4]  E. K. Gannett,et al.  THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS , 1965 .

[5]  Michel Renovell,et al.  Scan Design and Secure Chip , 2004, IOLTS.

[6]  K. Hypponen,et al.  “Nino” man-in-the-middle attack on bluetooth secure simple pairing , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.

[7]  Jens Eliasson,et al.  Time synchronous Bluetooth sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[8]  Srdjan Krco,et al.  Bluetooth Based Wireless Sensor Networks –Implementation Issues and Solutions , 2002 .

[9]  Kwangjo Kim,et al.  Wireless Authentication Protocol Preserving User Anonymity , 2001 .

[10]  Sandra Kay Miller Facing the Challenge of Wireless Security , 2001, Computer.

[11]  Jian Wang,et al.  Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[12]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[13]  Keijo Haataja,et al.  Security Threats and Countermeasures in Bluetooth-Enabled Systems , 2009 .

[14]  Chang-Seop Park,et al.  Secure Key Distribution Protocol for ZigBee Wireless Sensor Network , 2012 .

[15]  B. P. Lathi,et al.  Modern Digital and Analog Communication Systems , 1983 .

[16]  Sean W. Smith,et al.  Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.

[17]  Tao,et al.  A Security-enhanced Key Distribution Scheme for AODVjr Routing Protocol in ZigBee Networks , 2013 .

[18]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[19]  K. Hypponen,et al.  Man-In-The-Middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.

[20]  R. F. Olanrewaju,et al.  A Secure Authentication Scheme for Bluetooth Connection , 2014, 2014 International Conference on Computer and Communication Engineering.

[21]  G. Edward Suh,et al.  Aegis: A Single-Chip Secure Processor , 2007, IEEE Design & Test of Computers.

[22]  Thian Song Ong,et al.  Secure biometric template protection via randomized dynamic quantization transformation , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[23]  K. Haataja,et al.  Practical Man-in-the-Middle Attacks Against Bluetooth Secure Simple Pairing , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[24]  Kenneth Rose,et al.  On Constrained Randomized Quantization , 2012, IEEE Transactions on Signal Processing.

[25]  N. Asokan,et al.  Security Associations in Personal Networks: A Comparative Analysis , 2007, ESAS.

[26]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[27]  Anand R. Tripathi,et al.  Mutual Authentication in Wireless Networks , 1997 .

[28]  Bong-Hwan Kim,et al.  Analysis of ZigBee Security Mechanism , 2012 .

[29]  Keijo Haataja,et al.  New Efficient RF Fingerprint-Based Security Solution for Bluetooth Secure Simple Pairing , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[30]  Gunhee Lee,et al.  A Key Establishment Scheme for Providing Secure Multicasting over Bluetooth Scatternets , 2007, 2007 Second International Conference on Communications and Networking in China.

[31]  Hillary Brown Building for high performance , 2000 .

[32]  Gerrit Beldman,et al.  Lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[33]  Daniel Cvrcek Security of Wireless Communication , 2008, FIDIS.