Unidirectional Auxiliary Channel Challenge-Response Authentication
Paper in proceeding, 2008

We propose an approach for authentication of exchanged public values between two previously unknown devices in close proximity. We suggest using a unidirectional auxiliary channel challenge-response scheme, where the response and challenge from one device are transmitted over an auxiliary channel. It is assumed that a network attacker cannot access the auxiliary channel, and thus, man-in-the-middle attacks are prevented since the attacker cannot learn the response and challenge. In addition, passive eavesdropping is prevented since no shared secrets are used. We design a unidirectional auxiliary channel challenge-response protocol for Bluetooth and show that it is substantially more efficient and achieves an equal or increased level of security while maintaining the usability and convenience level for the user in comparison to the original Bluetooth protocol.

Wireless

pairing

authentication

unidirectional auxiliary channel challenge-response

Author

Dennis Nilsson

Chalmers, Computer Science and Engineering (Chalmers), Computer Engineering (Chalmers)

Ulf Larson

Chalmers, Computer Science and Engineering (Chalmers), Computer Engineering (Chalmers)

Erland Jonsson

Chalmers, Computer Science and Engineering (Chalmers), Computer Engineering (Chalmers)

7th Annual Wireless Telecommunications Symposium, WTS 2008; Ponoma, CA; United States; 24 April 2008 through 26 April 2008

84-91
978-142441870-1 (ISBN)

Subject Categories

Computer Engineering

DOI

10.1109/WTS.2008.4547548

ISBN

978-142441870-1

More information

Created

10/6/2017