Abstract
In the era of the Internet of Things, Bluetooth low energy (BLE/BTLE) plays an important role as a well-known wireless communication technology. While the security and privacy of BLE have been analyzed and fixed several times, the threat of side-channel attacks to BLE devices is still not well understood. In this work, we highlight a side-channel threat to the re-keying protocol of BLE. This protocol uses a fixed long term key for generating session keys, and the leakage of the long term key could render the encryption of all the following (and previous) connections useless. Our attack exploits the side-channel leakage of the re-keying protocol when it is implemented on embedded devices. In particular, we present successful correlation electromagnetic analysis and deep learning based profiled analysis that recover long term keys of BLE devices. We evaluate our attack on an ARM Cortex-M4 processor (Nordic Semiconductor nRF52840) running Nimble, a popular open-source BLE stack. Our results demonstrate that the long term key can be recovered within only a small amount of electromagnetic traces. Further, we summarize the features and limitations of our attack, and suggest a range of countermeasures to prevent it.
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Portal S T S. Bluetooth low energy (BLE) enabled de vices market volume worldwide, from 2013 to 2020 (in million units). Technical Report, Statista Research Department, 2018. https://www.statista.com/statistics/750569/worldwide-bluetooth-low-energy-device-market-volume/, Sept. 2023.
Rose A, Ramsey B. Picking bluetooth low energy locks from a quarter mile away. In Proc. the DEF CON 24 Hacking Conf., Aug. 2016.
Ryan M. Bluetooth: With low energy comes low security. In Proc. the 7th USENIX Workshop on Offensive Technologies, Aug. 2013, Article No. 4. https://doi.org/10.5555/2534748.2534754.
Zhang Y, Weng J, Dey R, Jin Y E, Lin Z Q, Fu X W. Breaking secure pairing of Bluetooth low energy using downgrade attacks. In Proc. the 29th USENIX Conference on Security Symposium, Aug. 2020, Article No. 3.
Antonioli D, Tippenhauer N O, Rasmussen K. Key negotiation downgrade attacks on Bluetooth and Bluetooth low energy. ACM Trans. Privacy and Security, 2020, 23(3): Article No. 14. https://doi.org/10.1145/3394497.
Wu J L, Nan Y H, Kumar V et al. BLESA: Spoofing attacks against reconnections in Bluetooth low energy. In Proc. the 14th USENIX Conference on Offensive Technologies, Aug. 2020, Article No. 8.
Biham E, Neumann L. Breaking the Bluetooth pairing—The fixed coordinate invalid curve attack. In Proc. the 26th International Conference on Selected Areas in Cryptography, Aug. 2019, pp.250–273. https://doi.org/10.1007/978-3-030-38471-5_11.
Haataja K, Toivanen P. Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures. IEEE Trans. Wireless Communications, 2010, 9(1): 384–392. https://doi.org/10.1109/TWC.2010.01.090935.
Murphy S. The advanced encryption standard (AES). Information Security Technical Report, 1999, 4(4): 12–17. https://doi.org/10.1016/S1363-4127(99)80083-1.
Kocher P, Jaffe J, Jun B. Differential power analysis. In Proc. the 19th Annual International Cryptology Conference, Aug. 1999, pp.388–397. https://doi.org/10.1007/3-540-48405-1_25.
Dehbaoui A, Lomné V, Maurine P, Torres L, Robert M. Enhancing electromagnetic attacks using spectral coherence based cartography. In Proc. the 17th IFIP International Conference on Very Large Scale Integration, Oct. 2009, pp.11–16. https://doi.org/10.1109/VLSISOC.2009.6041323.
Gierlichs B, Batina L, Tuyls P et al. Mutual information analysis. In Proc. the 10th International Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2008, pp.426–442. https://doi.org/10.1007/978-3-540-85053-3_27.
Timon B. Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptographic Hardware and Embedded Systems, 2019, 2019(2): 107–131. https://doi.org/10.13154/tches.v2019.i2.107-131.
Chari S, Rao J R, Rohatgi P. Template attacks. In Proc. the 4th International Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2002, pp.13–28. https://doi.org/10.1007/3-540-36400-5_3.
Schindler W, Lemke K, Paar C. A stochastic model for differential side channel cryptanalysis. In Proc. the 7th International Workshop on Cryptographic Hardware and Embedded Systems, Sept. 2005, pp.30–46. https://doi.org/10.1007/11545262_3.
Hospodar G, Gierlichs B, De Mulder E, Verbauwhede I, Vandewalle J. Machine learning in side-channel analysis: A first study. Journal of Cryptographic Engineering, 2011, 1(4): 293–302. https://doi.org/10.1007/s13389-011-0023-x.
Lerman L, Bontempi G, Markowitch O. Side channel attack: An approach based on machine learning. In Proc. the 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design, Feb. 2011, pp.29–41.
Maghrebi H, Portigliatti T, Prouff E. Breaking cryptographic implementations using deep learning techniques. In Proc. the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, Dec. 2016, pp.3–26. https://doi.org/10.1007/978-3-319-49445-6_1.
Cagli E, Dumas C, Prouff E. Convolutional neural networks with data augmentation against jitter-based countermeasures. In Proc. the 19th International Conference on Cryptographic Hardware and Embedded Systems, Sept. 2017, pp.45–68. https://doi.org/10.1007/978-3-319-66787-4_3.
Das D, Golder A, Danial J, Ghosh S, Raychowdhury A, Sen S. X-DeepSCA: Cross-device deep learning side channel attack. In Proc. the 56th Annual Design Automation Conference, Jun. 2019, Article No. 134. https://doi.org/10.1145/3316781.3317934.
Wang R Z, Wang H Y, Dubrova E. Far field EM sidechannel attack on AES using deep learning. In Proc. the 4th ACM Workshop on Attacks and Solutions in Hardware Security, Nov. 2020, pp.35–44. https://doi.org/10.1145/3411504.3421214.
Yu W, Chen J. Deep learning-assisted and combined attack: A novel side-channel attack. Electronics Letters, 2018, 54(19): 1114–1116. https://doi.org/10.1049/el.2018.5411.
Wang H Y, Dubrova E. Tandem deep learning side-channel attack against FPGA implementation of AES. In Proc. the 2020 IEEE International Symposium on Smart Electronic Systems, Dec. 2020, pp.147–150. https://doi.org/10.1109/iSES50453.2020.00041.
Zaid G, Bossuet L, Habrard A, Venelli A. Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptographic Hardware and Embedded Systems, 2020, 2020(1): 1–36. https://doi.org/10.13154/tches.v2020.i1.1-36.
Bhasin S, Chattopadhyay A, Heuser A, Jap D, Picek S, Shrivastwa R R. Mind the portability: A warriors guide through realistic profiled side-channel analysis. In Proc. the 27th Annual Network and Distributed System Security Symposium, Feb. 2020. https://doi.org/10.14722/ndss.2020.24390.
Gandolfi K, Mourtel C, Olivier F. Electromagnetic analysis: Concrete results. In Proc. the 3rd International Workshop on Cryptographic Hardware and Embedded Systems, May 2001, pp.251–261. https://doi.org/10.1007/3-540-44709-1_21.
Camurati G, Poeplau S, Muench M, Hayes T, Francillon A. Screaming channels: When electromagnetic side channels meet radio transceivers. In Proc. the 2018 ACM SIGSAC Conference on Computer and Communications Security, Oct. 2018, pp.163–177. https://doi.org/10.1145/3243734.3243802.
Camurati G, Francillon A, Standaert F X. Understanding screaming channels: From a detailed analysis to improved attacks. IACR Trans. Cryptographic Hardware and Embedded Systems, 2020, 2020(3): 358–401. https://doi.org/10.13154/tches.v2020.i3.358-401.
James G, Witten D, Hastie T, Tibshirani R. An Introduction to Statistical Learning: With Applications in R. Springer, 2013. https://doi.org/10.1007/978-1-4614-7138-7.
Picek S, Heuser A, Jovic A, Bhasin S, Regazzoni F. The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. IACR Trans. Cryptographic Hardware and Embedded Systems, 2018, 2019(1): 209–237. https://doi.org/10.13154/tches.v2019.i1.209-237.
Mangard S, Oswald E, Popp T. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, 2007. https://doi.org/10.1007/978-0-387-38162-6.
Kim H S, Hong S, Lim J. A fast and provably secure higher-order masking of AES S-box. In Proc. the 13th International Workshop on Cryptographic Hardware and Embedded Systems, Sept 28.–Oct. 1, 2011, pp.95–107. https://doi.org/10.1007/978-3-642-23951-9_7.
Longo J, De Mulder E, Page D et al. SoC it to EM: Electromagnetic side-channel attacks on a complex system-onchip. In Proc. the 17th International Workshop on Cryptographic Hardware and Embedded Systems, Sept. 2015, pp.620–640. https://doi.org/10.1007/978-3-662-48324-4_31.
Author information
Authors and Affiliations
Corresponding author
Supplementary Information
ESM 1
(PDF 595 kb)
Rights and permissions
About this article
Cite this article
Cao, P., Zhang, C., Lu, XJ. et al. Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy. J. Comput. Sci. Technol. 38, 1132–1148 (2023). https://doi.org/10.1007/s11390-022-1229-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11390-022-1229-3