{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T16:32:54Z","timestamp":1718382774719},"reference-count":35,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2017,4,2]],"date-time":"2017-04-02T00:00:00Z","timestamp":1491091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I\/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.<\/jats:p>","DOI":"10.3390\/s17040752","type":"journal-article","created":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T17:32:30Z","timestamp":1491240750000},"page":"752","source":"Crossref","is-referenced-by-count":2,"title":["Security Enhancement of Wireless Sensor Networks Using Signal Intervals"],"prefix":"10.3390","volume":"17","author":[{"given":"Jaegeun","family":"Moon","sequence":"first","affiliation":[{"name":"School of Electronics Engineering, Kyungpook National University, 80 Daehakro Buk-gu, Daegu 702701, Korea"}]},{"given":"Im Y.","family":"Jung","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering, Kyungpook National University, 80 Daehakro Buk-gu, Daegu 702701, Korea"}]},{"given":"Jaesoo","family":"Yoo","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Chungbuk National University, 1 Chungdaero Seowon-gu, Cheongju 28644, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2017,4,2]]},"reference":[{"key":"ref_1","unstructured":"Krco, S. (2002, January 26\u201328). Bluetooth Based Wireless Sensor Networks\u2014Implementation Issues and Solutions. Invited paper. Proceedings of the 10th Telecommunications Forum Telfor 2002, Belgrade, Serbia."},{"key":"ref_2","unstructured":"Evans, D. (2011). The Internet of Things How the Next Evolution of the Internet Is Changing Everything, Cisco Internet Business Solutions Group."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/2.933495","article-title":"Facing the challenge of wireless security","volume":"34","author":"Miller","year":"2001","journal-title":"Computer"},{"key":"ref_4","unstructured":"Go, J., Park, J., and Kim, K. (2001, January 9\u201312). Wireless Authentication Protocol Preserving User Anonymity. Proceedings of the Wireless Personal Multimedia Communications, Aalborg, Denmark."},{"key":"ref_5","unstructured":"Joos, R.R., and Tripathi, A.R. (1997). Mutual Authentication in Wireless Networks, Department of Computer Science, University of Minnesota. Technical Report."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1023\/A:1019968506856","article-title":"Security in wireless communication","volume":"22","author":"Rahman","year":"2002","journal-title":"Wirel. Pers. Commun."},{"key":"ref_7","unstructured":"Suomalainen, J., Valkonen, J., and Asokan, N. (2007, January 2\u20133). Security Associations in Personal Networks: A Comparative Analysis. Proceedings of the European Workshop on Security in Ad-Hoc and Sensor Networks, Cambridge, UK."},{"key":"ref_8","unstructured":"Sadeghzadeh, S.H., Shirazani, S.J.M., and Mosleh, M. (2010, January 7\u201310). A new secure scheme purposed for recognition and authentication protocol in Bluetooth environment. Proceedings of the Advanced Communication Technology (ICACT), Phoenix Park, Korea."},{"key":"ref_9","unstructured":"Bluetooth Special Interest Group (2014). Bluetooth Core Specification Version 4.2, Bluetooth SIG."},{"key":"ref_10","unstructured":"Forouzan, B.A. (2008). Cryptography and Network Security, McGraw-Hill. [International ed.]."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Barnickel., J., Wang, J., and Meyer, U. (2012, January 25\u201327). Implementing an Attack on Bluetooth 2.1+ Secure Simple pairing in Passkey Entry Mode. Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK.","DOI":"10.1109\/TrustCom.2012.182"},{"key":"ref_12","unstructured":"Haataja, K. (2009). Security Threats and Countermeasures in Bluetooth-Enabled Systems. [Ph.D. Thesis, University of Kuopio]."},{"key":"ref_13","unstructured":"Hypp\u00f6nen, K., and Haataja, K. (2007, January 26\u201328). Ni\u00f1o Man-In-The-Middle Attack on Bluetooth Secure Simple Pairing. Proceedings of the IEEE Third International Conference in Central Asia on Internet, the Next Generation of Mobile, Wireless and Optical Communications Networks, Tashkent, Uzbekistan."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Haataja, K., and Hypp\u00f6nen, K. (2008, January 12\u201314). Man-In-The-Middle Attacks on Bluetooth: A Comparative Analysis, a Novel Attack, and Countermeasures. Proceedings of the IEEE Third International Symposium on Communications, Control and Signal Processing, St. Julians, Malta.","DOI":"10.1109\/ISCCSP.2008.4537388"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Haataja, K., and Toivanen, P. (2008, January 12\u201314). Practical Man-In-The Middle Attacks against Bluetooth Secure Simple Pairing. Proceedings of the 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China.","DOI":"10.1109\/WiCom.2008.1153"},{"key":"ref_16","unstructured":"Lathi, B.P. (1998). Modern Digital and Analog Communication Systems, Oxford University Press. [3rd ed.]."},{"key":"ref_17","first-page":"417","article-title":"Analysis of ZigBee Security Mechanism","volume":"9","author":"Kim","year":"2012","journal-title":"J. Secur. Eng."},{"key":"ref_18","unstructured":"The Institute of Electrical and Electronics Engineers (2001). Standard for Local and Metropolitan Area Networks\u2014Port-Based Network Access Control, IEEE. IEEE Std 802.1X."},{"key":"ref_19","unstructured":"The Institute of Electrical and Electronics Engineers (2006). Wireless LAN medium Access Control (MAC) and Physical Layer (PHY) Specification: Enhancements for Higher Throughput, IEEE. IEEE Std 802.11n."},{"key":"ref_20","unstructured":"The Institute of Electrical and Electronics Engineers (2004). LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Medium Access Control (MAC) Security Enhancements, IEEE. IEEE Std 802.11i."},{"key":"ref_21","unstructured":"The Institute of Electrical and Electronics Engineers (2007). IEEE Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements\u2014Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Sastry, N., and Wagner, D. (2004, January 1). Security considerations for IEEE 802.15.4 networks. Proceedings of the 2004 ACM Workshop on Wireless security, Philadelphia, PA, USA.","DOI":"10.1145\/1023646.1023654"},{"key":"ref_23","first-page":"745","article-title":"Secure Key Distribution Protocol for ZigBee Wireless Sensor Network","volume":"22","author":"Oh","year":"2012","journal-title":"J. Korea Inst. Inf. Secur. Cryptol."},{"key":"ref_24","first-page":"577","article-title":"A Security-enhanced Key Distribution Scheme for AODVjr Routing Protocol in ZigBee Networks","volume":"22","author":"Tao","year":"2013","journal-title":"Chin. J. Electron."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Diallo, A.S., Al-Khateeb, W.F.M., Olanrewaju, R.F., and Sado, F. (2014, January 23\u201325). A Secure Authentication Scheme for Bluetooth Connection. Proceedings of the Computer and Communication Engineering, Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICCCE.2014.29"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Biswas, S., Afzal, S.R., Koh, J., Hasan, M., Lee, G., and Kim, D. (2007, January 22\u201324). A Key Establishment Scheme for Providing Secure Multicasting over Bluetooth Scatternets. Proceedings of the Communications and Networking in China, Shanghai, China.","DOI":"10.1109\/CHINACOM.2007.4469387"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Pasanen, S., Haataja, K., Paivinen, N., and Toivanen, P. (2010, January 5\u20138). New Efficient RF Fingerprint-Based Security Solution for Bluetooth Secure Simple Pairing. Proceedings of the System Sciences, Koloa, HI, USA.","DOI":"10.1109\/HICSS.2010.286"},{"key":"ref_28","unstructured":"Rasmussen, K.B., and Capkun, S. (2007, January 17\u201321). Implications of radio fingerprinting on the security of sensor networks. Proceedings of the Security and Privacy in Communications Networks and the Workshops, Nice, France."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Teoh, A., and Ong, T.S. (2008, January 23\u201324). Secure biometric template protection via randomized dynamic quantization transformation. Proceedings of the Biometrics and Security Technologies, Islamabad, Pakistan.","DOI":"10.1109\/ISBAST.2008.4547645"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"3291","DOI":"10.1109\/TSP.2013.2261296","article-title":"On Constrained Randomized Quantization","volume":"61","author":"Akyol","year":"2013","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_31","unstructured":"Eliasson, J., Lundberg, M., and Lindgren, P. (2006, January 8\u201310). Time synchronous Bluetooth sensor networks. Proceedings of the IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1016\/S1389-1286(98)00019-X","article-title":"Building a High Performance, Programmable Secure Coprocessor","volume":"31","author":"Smith","year":"1999","journal-title":"Comput. Netw."},{"key":"ref_33","unstructured":"Hely, D., Flottes, M.-L., Bancel, F., Rouzeyre, B., Berard, N., and Renovell, M. (2004, January 12\u201314). Scan design and secure chip. Proceedings of the On-Line Testing Symposium, Funchal, Portugal."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Zhang, L., Wen, S., Wang, R., and Zhang, G. (2009, January 23\u201324). A System Architecture Design Scheme of the Secure Chip Based on SoC. Proceedings of the Intelligent Systems and Applications, Wuhan, China.","DOI":"10.1109\/IWISA.2009.5072680"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1109\/MDT.2007.179","article-title":"Aegis: A Single-Chip Secure Processor","volume":"24","author":"Suh","year":"2007","journal-title":"Des. Test Comput."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/4\/752\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T09:03:16Z","timestamp":1717750996000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/4\/752"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,2]]},"references-count":35,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2017,4]]}},"alternative-id":["s17040752"],"URL":"https:\/\/doi.org\/10.3390\/s17040752","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,2]]}}}