•  
  •  
 

Journal of System Simulation

Abstract

Abstract: Aiming at the problem that BLE Secure Simple Pairing protocol is vulnerable to eavesdropping and man-in-the-middle attacks, a BLE key agreement scheme based on hash chain was proposed. The scheme realized mutual authentication and link key agreement applying the unidirectivity and crashworthiness of hash chain. Update mechanism of the hash chain was designed to prevent from reuse of hash chain node values. The security analysis of BAN logic and experiment results show that, the scheme can effectively resist eavesdropping and man-in-the-middle attacks. Meanwhile, it has low storage and computation overheads.

First Page

1412

Revised Date

2015-07-21

Last Page

1419

CLC

TP309.1

Recommended Citation

Huang Yibo, Huang Yicai, Yu Bin. Design of BLE Key Agreement Scheme Based on Hash Chain[J]. Journal of System Simulation, 2016, 28(6): 1412-1419.

Share

COinS