Journal of System Simulation
Abstract
Abstract: Aiming at the problem that BLE Secure Simple Pairing protocol is vulnerable to eavesdropping and man-in-the-middle attacks, a BLE key agreement scheme based on hash chain was proposed. The scheme realized mutual authentication and link key agreement applying the unidirectivity and crashworthiness of hash chain. Update mechanism of the hash chain was designed to prevent from reuse of hash chain node values. The security analysis of BAN logic and experiment results show that, the scheme can effectively resist eavesdropping and man-in-the-middle attacks. Meanwhile, it has low storage and computation overheads.
Recommended Citation
Huang, Yibo; Huang, Yicai; and Yu, Bin
(2020)
"Design of BLE Key Agreement Scheme Based on Hash Chain,"
Journal of System Simulation: Vol. 28:
Iss.
6, Article 23.
Available at:
https://dc-china-simulation.researchcommons.org/journal/vol28/iss6/23
First Page
1412
Revised Date
2015-07-21
DOI Link
https://doi.org/
Last Page
1419
CLC
TP309.1
Recommended Citation
Huang Yibo, Huang Yicai, Yu Bin. Design of BLE Key Agreement Scheme Based on Hash Chain[J]. Journal of System Simulation, 2016, 28(6): 1412-1419.
Included in
Artificial Intelligence and Robotics Commons, Computer Engineering Commons, Numerical Analysis and Scientific Computing Commons, Operations Research, Systems Engineering and Industrial Engineering Commons, Systems Science Commons