{"title":"蓝牙Mesh配置协议的形式化分析","authors":"Min Shi;Jing Chen;Haoran Zhao;Kun He;Ruiying Du","doi":"10.1109/JIOT.2025.3569262","DOIUrl":null,"url":null,"abstract":"Bluetooth mesh (BM) is a wireless mesh networking technology based on bluetooth low energy, where new devices need to be provisioned to join an existing network. Currently, security research on the BM provisioning protocol primarily focuses on the manual analysis of potential vulnerabilities, while existing formal models are too simplistic to capture all the attacks present in the protocol. In this article, we utilize Tamarin Prover to conduct a comprehensive formal analysis of the BM provisioning protocol. Our model encompasses all phases of the protocol from beaconing to data distribution, and includes the modeling of all public key exchanges and authentication methods specified in the BM specification. Additionally, we accurately model the AES-CMAC primitive used in the protocol, with the help of deconstruction rules and built-in message theories in Tamarin. This AES-CMAC model enables the analysis of subtle behaviors that were previously beyond the scope of symbolic analysis. Our model successfully reproduces reflection and primitive misuse attacks found in previous studies and identifies two new vulnerabilities. We propose countermeasures for the aforementioned attacks and extend our provisioning model to verify the effectiveness of these countermeasures.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 15","pages":"29884-29896"},"PeriodicalIF":8.9000,"publicationDate":"2025-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Formal Analysis of Bluetooth Mesh Provisioning Protocol\",\"authors\":\"Min Shi;Jing Chen;Haoran Zhao;Kun He;Ruiying Du\",\"doi\":\"10.1109/JIOT.2025.3569262\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Bluetooth mesh (BM) is a wireless mesh networking technology based on bluetooth low energy, where new devices need to be provisioned to join an existing network. Currently, security research on the BM provisioning protocol primarily focuses on the manual analysis of potential vulnerabilities, while existing formal models are too simplistic to capture all the attacks present in the protocol. In this article, we utilize Tamarin Prover to conduct a comprehensive formal analysis of the BM provisioning protocol. Our model encompasses all phases of the protocol from beaconing to data distribution, and includes the modeling of all public key exchanges and authentication methods specified in the BM specification. Additionally, we accurately model the AES-CMAC primitive used in the protocol, with the help of deconstruction rules and built-in message theories in Tamarin. This AES-CMAC model enables the analysis of subtle behaviors that were previously beyond the scope of symbolic analysis. Our model successfully reproduces reflection and primitive misuse attacks found in previous studies and identifies two new vulnerabilities. We propose countermeasures for the aforementioned attacks and extend our provisioning model to verify the effectiveness of these countermeasures.\",\"PeriodicalId\":54347,\"journal\":{\"name\":\"IEEE Internet of Things Journal\",\"volume\":\"12 15\",\"pages\":\"29884-29896\"},\"PeriodicalIF\":8.9000,\"publicationDate\":\"2025-03-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Internet of Things Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11002539/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11002539/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
A Formal Analysis of Bluetooth Mesh Provisioning Protocol
Bluetooth mesh (BM) is a wireless mesh networking technology based on bluetooth low energy, where new devices need to be provisioned to join an existing network. Currently, security research on the BM provisioning protocol primarily focuses on the manual analysis of potential vulnerabilities, while existing formal models are too simplistic to capture all the attacks present in the protocol. In this article, we utilize Tamarin Prover to conduct a comprehensive formal analysis of the BM provisioning protocol. Our model encompasses all phases of the protocol from beaconing to data distribution, and includes the modeling of all public key exchanges and authentication methods specified in the BM specification. Additionally, we accurately model the AES-CMAC primitive used in the protocol, with the help of deconstruction rules and built-in message theories in Tamarin. This AES-CMAC model enables the analysis of subtle behaviors that were previously beyond the scope of symbolic analysis. Our model successfully reproduces reflection and primitive misuse attacks found in previous studies and identifies two new vulnerabilities. We propose countermeasures for the aforementioned attacks and extend our provisioning model to verify the effectiveness of these countermeasures.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.