1. 基于二次剩余的低功耗蓝牙用户认证方案.
- Author
-
黄一才, 黄艺波, and 郁滨
- Abstract
Since the security mechanism of bluetooth low energy protocol does not verify the legitimacy of user identity,firstly, this paper analysed and pointed out that the existing bluetooth user authentication protocol could not resist counterfeiting and eavesdropping attacks,and also could not be applied to BLE protocol. Secondly, combining with the BLE protocol hierarchy,it designed BLE user authentication model,then established BLE user authentication scheme based on quadratic residue,which used the Chinese remainder theorem to solve quadratic residue, realizing user authentication mutual authentication and user anonymity. Security analysis shows that the scheme can be effective against the threats of user password leakage, loss of the slave device,impersonation attack and user privacy attack. Theoretical analysis and the experiment results show that it has higher efficiency and smaller storage requirements. Thus, the scheme is suitable for BLE devices. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF