Eddystone-EID: Secure and Private Infrastructural Protocol for BLE Beacons.

IEEE Trans. Inf. Forensics Secur.(2022)

引用 5|浏览32
暂无评分
摘要
Beacons are small devices which are playing an important role in the Internet of Things (IoT), connecting "things " without IP connection to the Internet via Bluetooth Low Energy (BLE) communication. In this paper we present the first private end-to-end encryption protocol called the Eddystone-Ephemeral-ID (Eddystone-EID) protocol. This protocol enables connectivity from any beacon to its remote owner, while supporting beacon's privacy and security, and essentially preserving the beacon's low power consumption. We describe the Eddystone-EID development goals, discuss the design decisions, show the cryptographic solution, and analyse its privacy, security, and performance. Finally, we present three secure IoT applications built on Eddystone-EID, demonstrating its utility as a security and privacy infrastructure in the IoT domain. Further, Eddystone-EID is a prototypical example of security design for an asymmetric system in which on one side there are small power-deficient elements (the beacons) and on the other side there is a powerful computing engine (a cloud). The crux of the design strategy is based on: (1) transferring work from the beacon to the cloud, and then (2) building a trade-off between cloud online work against cloud offline work, in order to enable fast real-time reaction of the cloud. These two principles seem to be generic and can be used for other problems in the IoT domain.
更多
查看译文
关键词
IoT,bluetooth smart,BLE,beacons (tags),privacy,security,linkability,cloud,identity resolver,pseudorandomness,indistinguishability
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要