Miguel Mesa-Simón , Antonio Escobar-Molero , Luis Parrilla , Diego P. Morales , José Antonio Álvarez-Bermejo , Francisco J. Romero
{"title":"Integration of Hardware Security Modules into BLE Beacons: Fundamentals and Use in a Secure and Private Geofencing Application","authors":"Miguel Mesa-Simón , Antonio Escobar-Molero , Luis Parrilla , Diego P. Morales , José Antonio Álvarez-Bermejo , Francisco J. Romero","doi":"10.1016/j.iot.2025.101762","DOIUrl":null,"url":null,"abstract":"<div><div>Bluetooth Low Energy (BLE) is a wireless technology designed for creating personal area networks in low-power applications. In the context of BLE, Beacon devices are widely used to transmit small packets of data with unique identifiers at regular intervals to be detected by surrounding devices. These devices enable a wide range of applications, including indoor navigation, marketing, and asset tracking. However, BLE Beacons suffer from multiple security issues and privacy concerns since the transmissions are unencrypted and do not include authentication mechanisms. While many implementations try to provide security to the Beacons packet, they often rely on external servers, static keys, synchronization for key derivation, or use difficult to maintain and to operate Public Key Infrastructure (PKI). In this work, we propose a solution to enhance Beacon security through the integration of Secure Elements (SEs), establishing a Root of Trust. Our approach is based on the over-the-air activation of the BLE beacons incorporating an authentication mechanism and a key derivation technique to safeguard privacy and data integrity in the communication. We demonstrate that this implementation incurs minimal delays and power consumption compared to traditional Beacons while avoiding the added complexity of solutions based on Certificates and Public Key Infrastructure (PKI). The feasibility of the proposed approach is also illustrated through a secure and privacy-preserving geofencing application. In summary, this method supports a low-power and secure point-to-point communication suitable not only for BLE beacon networks, but also for other IoT scenarios where data privacy is critical.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101762"},"PeriodicalIF":7.6000,"publicationDate":"2025-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2542660525002756","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Bluetooth Low Energy (BLE) is a wireless technology designed for creating personal area networks in low-power applications. In the context of BLE, Beacon devices are widely used to transmit small packets of data with unique identifiers at regular intervals to be detected by surrounding devices. These devices enable a wide range of applications, including indoor navigation, marketing, and asset tracking. However, BLE Beacons suffer from multiple security issues and privacy concerns since the transmissions are unencrypted and do not include authentication mechanisms. While many implementations try to provide security to the Beacons packet, they often rely on external servers, static keys, synchronization for key derivation, or use difficult to maintain and to operate Public Key Infrastructure (PKI). In this work, we propose a solution to enhance Beacon security through the integration of Secure Elements (SEs), establishing a Root of Trust. Our approach is based on the over-the-air activation of the BLE beacons incorporating an authentication mechanism and a key derivation technique to safeguard privacy and data integrity in the communication. We demonstrate that this implementation incurs minimal delays and power consumption compared to traditional Beacons while avoiding the added complexity of solutions based on Certificates and Public Key Infrastructure (PKI). The feasibility of the proposed approach is also illustrated through a secure and privacy-preserving geofencing application. In summary, this method supports a low-power and secure point-to-point communication suitable not only for BLE beacon networks, but also for other IoT scenarios where data privacy is critical.
期刊介绍:
Internet of Things; Engineering Cyber Physical Human Systems is a comprehensive journal encouraging cross collaboration between researchers, engineers and practitioners in the field of IoT & Cyber Physical Human Systems. The journal offers a unique platform to exchange scientific information on the entire breadth of technology, science, and societal applications of the IoT.
The journal will place a high priority on timely publication, and provide a home for high quality.
Furthermore, IOT is interested in publishing topical Special Issues on any aspect of IOT.