{"title":"Is there a tradeoff between privacy and security in BLE-based IoT applications: Using a smart vehicle of a major Taiwanese brand as example","authors":"Shi-Cho Cha, Chen-Yu Dai, Jyun-Fu Chen","doi":"10.1109/GCCE.2016.7800552","DOIUrl":null,"url":null,"abstract":"In current Bluetooth Low Energy (BLE)-based Internet of Things (IoT) applications, people may need to prove their identities to Internet services to obtain credentials to pair with IoT devices. In this case, the bluetooth MAC address of a device could be used to increase the security of pairing processes. However, current BLE devices, especially smartphones, usually use random addresses to prevent others from tracking the devices with original bluetooth MAC addresses. While devices cannot identify one another with addresses, using random address may lead to higher security risk. This study uses a smart vehicle from a major Taiwanese brand as an example to illustrate this security impact of using BLE random addresses. Afterwards, the study provides generalized security requirements based the example scenario and a scheme to fulfill the requirement.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"98 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 5th Global Conference on Consumer Electronics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GCCE.2016.7800552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
In current Bluetooth Low Energy (BLE)-based Internet of Things (IoT) applications, people may need to prove their identities to Internet services to obtain credentials to pair with IoT devices. In this case, the bluetooth MAC address of a device could be used to increase the security of pairing processes. However, current BLE devices, especially smartphones, usually use random addresses to prevent others from tracking the devices with original bluetooth MAC addresses. While devices cannot identify one another with addresses, using random address may lead to higher security risk. This study uses a smart vehicle from a major Taiwanese brand as an example to illustrate this security impact of using BLE random addresses. Afterwards, the study provides generalized security requirements based the example scenario and a scheme to fulfill the requirement.