BLUETOOTH COMMUNICATION METHOD AND SYSTEM
20230239945 · 2023-07-27
Assignee
Inventors
- Julian GUILLOUX (Colombier, CH)
- Stéphanie SALGADO (La Neueville, CH)
- Marcel RUECKER (Stuttgart, DE)
- Joachim NAGEL (Reutlingen, DE)
- Yann RAVIER (Tübingen, DE)
Cpc classification
H04W4/80
ELECTRICITY
H04W72/0453
ELECTRICITY
H04L5/0048
ELECTRICITY
International classification
H04W72/0453
ELECTRICITY
Abstract
A Bluetooth communication method implemented between first and second electronic devices, including establishing a communication in a connected mode between the first and second devices including a key exchange operation between these two devices, and establishing a communication in an advertising mode between the first and second devices including a periodic broadcast by the second device to the first device of a message including a payload and a calculated tag from this key.
Claims
1. A Bluetooth communication method implemented between first and second electronic devices, the method comprising: establishing a communication in a connected mode between the first and second devices comprising a key exchange operation between these two devices; and establishing a communication in an advertising mode between the first and second devices comprising a periodic broadcast by the second device to the first device of a message comprising a payload and a calculated tag from this key.
2. A Bluetooth communication method implemented between first and second electronic devices, the method comprising: distributing by a third party tool of a key through a secure wired or wireless communication channel to the first and second devices; and establishing a communication in an advertising mode between the first and second devices comprising a periodic broadcast by the second device to the first device of a message comprising a payload and a calculated tag from this key.
3. The method according to claim 1, wherein the message comprises a sequence number which is updated for each message broadcasted by the second device to the first device.
4. The method according to claim 1, wherein the calculated tag is obtained by using the key to calculate a Message Authentication Code or to calculate a signature of the payload to be advertised.
5. The method according to claim 1, wherein an integrity check element of this message is a message authentication code.
6. The method according to claim 1, wherein the key is a shared secret key stored in a memory of the first and second devices.
7. The method according to claim 2, wherein the key is a shared secret key stored in a memory of the third party tool.
8. A Bluetooth communication system implemented between first and second devices, the system comprising the first and second devices and configured to: establish a communication in a connected mode between the first and second devices comprising a key exchange operation between these two devices; and establish a communication in an advertising mode between the first and second devices comprising a periodic broadcast by the second device to the first device of a message comprising a payload and a calculated tag from this key.
9. A Bluetooth communication system implemented between first and second devices, the system comprising the first and second devices and a third party tool, the system being configured to: distribute by the third party tool of a key through a secure wired or wireless communication channel to the first and second devices; and establish a communication in an advertising mode between these first and second devices comprising a periodic broadcast by the second device to the first device of a message comprising a payload and a calculated tag from this key.
10. The method according to claim 2, wherein the message comprises a sequence number which is updated for each message broadcasted by the second device to the first device.
11. The method according to claim 2, wherein the calculated tag is obtained by using the key to calculate a Message Authentication Code or to calculate a signature of the payload to be advertised.
12. The method according to claim 2, wherein an integrity check element of this message is a message authentication code.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0025] The present invention will be described subsequently in more detail with reference to the attached drawing, given by way of examples, but in no way limited thereto, in which:
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
DETAILED DESCRIPTION OF THE INVENTION
[0038] In the different embodiments of the invention illustrated in
[0039] In this method, the key information is exchanged between the first and second device. In this context, as illustrated in
[0040] As illustrated in
[0041] In this method, the key information can be agreed on in the following ways: [0042] a key agreement by using cryptographic algorithms such as Diffie-Hellman for example; [0043] a key distribution from second device to first device (or contrary). The key can be generated within the BLE/BT Classic core specification (e.g. use or derivation of the LTK, IRK, CSRK, DH SK) or outside of the BLE/BT Classic core specification.
[0044] Furthermore, the method comprises the use of the key to calculate a MAC (Message Authentication Code. E.g., AES-CMAC, HMAC) or a signature (e.g. ECDSA) of the payload to be advertised. The calculated tag (MAC or signature) is added to the payload and the payload with the tag is advertised. The payload integrity and authenticity is verified by the receiving device.
[0045] As previously specified, these methods of the first to the fourth embodiments ensure integrity and authenticity of the messages against malicious changes for messages advertised over BLE/BT Classic, which is up to now not possible. Moreover they optimize the use of the unilateral communication against bilateral.
[0046] In addition, it should be noted that these methods offer many advantages, including the following: [0047] achieved level of protection in advertising for message integrity and authenticity similar to the level achievable with Bluetooth “connected mode”. [0048] very low power consumption in comparison with a signed permanent connected mode. This allows to solve the dilemma of having to choose between low power consumption to get a high battery (and often product) lifetime and security (integrity and authenticity) of communication. [0049] more ecological products through a longer product lifetime thanks to a dramatically reduced power consumption in comparison with a signed permanent connected mode. [0050] lower complexity of the product thanks to the possibility to ensure integrity against malicious changes without a signed permanent connected mode for most or all of the communications. [0051] low additional effort on both side (receiver and transmitter) thanks to the possibility to reuse already implemented features (such as BLE connected mode).
[0052] These methods can be implemented in any BLE or BT Classic communication requiring integrity against malicious attacks of the communication but, for most of the time (or the whole time), not necessitating of a bidirectional communication. For example, these methods can be implemented in all of the following technical fields: [0053] automotive (like passenger cars, commercial vehicles, trucks), two-wheelers (like motorbike, bicycle, e-bike, scooter application), three-wheelers (like TucTuc): Tire Pressure Monitoring Sensor (TPMS) advertising over BLE; e-call communicating over BLE with a smartphone; presence detectors (e.g. in baby-seats) communicating over BLE with a smartphone; e-bike sensors and devices communicating over BLE with a receiver. [0054] medical: Communication of portable medical devices such as pacemakers and hearing devices communicating their data to a receiver over Bluetooth. [0055] agriculture: Sensors in fields communicating their data to a gateway over Bluetooth. [0056] industry: Sensors integrated in the production tools communicating their data over Bluetooth to a gateway; Assets tracking; [0057] consumer market: Numerous applications for Bluetooth communication between smartphones, tablets, laptops and wearables, hearables, gaming toys
[0058] In order to spare more energy, these methods can implement scan request/scan response instead of each advertisement.
[0059] In reference to
[0060] In this fifth embodiment, the method allows devices to advertise messages with protection against replay attack, in addition to integrity and authenticity protection. To achieve this, a sequence number, such as a counter for example, is used in addition to the previously described message signature or MAC. The receiver (e.g.: the first or the second device) will verify the consistency of the sequence number to ensure the freshness of the message. In case the counter needs to restart, for example because it has come to the end, the key used for the integrity check will be changed. In this way, the reuse of a previous message will be immediately recognized as invalid by the receiver.
[0061] It must be understood that the particularity of the method according to this fifth embodiment, is the addition of a sequence number (such as, for example, a counter) to the methods of the first, second, third and fourth embodiments. This allows devices using the Bluetooth communication protocol in advertising mode to communicate together and having these features implemented to ensure the freshness of the advertised messages. In that way, full protection against replay attack can be guaranteed.
[0062] This method of the fifth embodiment is similar to the methods of the first to fourth embodiments, except that it comprises the addition of the sequence number (such as a counter or a time stamp) to the payload. The dimensions of the sequence number is free. In this context, the receiver (e.g.: the first or second device) verifies the consistency of the sequence number. This key is changed each time the sequence number restart. It can be understood that this feature ensures that each message can be used only once.
[0063] As previously specified, the method of this fifth embodiment ensures integrity and authenticity of the messages against malicious changes for messages advertised over BLE/BT Classic, which is up to now not possible. Moreover it optimizes the use of the unilateral communication against bilateral.
[0064] In addition, it should be noted that this method offers many advantages, including the following: [0065] full protection against replay attack in advertising mode; [0066] very low power consumption in comparison with a permanent connected mode protected against replay attack; [0067] more ecological products through a longer product lifetime thanks to a dramatically reduced power consumption in comparison with a permanent connected mode (in which a similar concept needs to be implemented); [0068] lower complexity of the product thanks to the possibility to ensure protection against replay attack without using a permanent connected mode for most or all of the communications; [0069] low additional effort on both side (receiver and transmitter) thanks to the possibility to reuse already implemented features (such as BLE connected mode).
[0070] This method can be implemented in any BLE or BT Classic communication requiring protection against replay attack but, for most of the time (or the whole time), not necessitating of a bidirectional communication, if protection against replay attack can be ensured in advertising mode. For example, this method can be implemented in all of the following technical fields: [0071] automotive (like passenger cars, commercial vehicles, trucks), two-wheelers (like motorbike, bicycle, e-bike, scooter application), three-wheelers (like TucTuc): Tire Pressure Monitoring Sensor (TPMS) advertising over BLE; e-call communicating over BLE with a smartphone; presence detectors (e.g. in baby-seats) communicating over BLE with a smartphone; e-bike sensors and devices communicating over BLE with a receiver. [0072] medical: Communication of portable medical devices such as pacemakers and hearing devices communicating their data to a receiver over Bluetooth. [0073] agriculture: Sensors in fields communicating their data to a gateway over Bluetooth. [0074] industry: Sensors integrated in the production tools communicating their data over Bluetooth to a gateway; Assets tracking; [0075] consumer market: Numerous applications for Bluetooth communication between smartphones, tablets, laptops and wearables, hearables, gaming toys
[0076] In reference to
[0077] Furthermore, unlike the sixth embodiment, the method of the seventh embodiment allows the first and second devices to advertise messages with integrity, authenticity and confidentiality protection. To achieve this, each encrypted message exchanged between these two devices comprises the payload and the calculated tag from the key.