An Intelligent Bidirectional Authentication Method: Nabil El Kadhi and Hazem EL GENDY
An Intelligent Bidirectional Authentication Method: Nabil El Kadhi and Hazem EL GENDY
Abstract: A new Bluetooth authentication model using some malicious individuals. Wireless networks are exposed to
game theory concepts is presented in this paper. Bluetooth is a many risks and hacker attacks, ranging from data manip-
wireless communication protocol designed for WPAN (Wireless ulation and eavesdropping to viruses and warms attacks. On
Personal Area Network) use. Game theory is a branch of one hand, security needs are increasingly vital. On the other
mathematics and logic which deals with the analysis of games. hand, many security problems have been addressed by game
An authentication between two Bluetooth devices is an theory. In fact, game theory is the formal study of interactive
unidirectional challenge-response procedure and consequently, decision processes [11] offering enhanced understanding of
has many vulnerabilities. We propose a bidirectional conflict and cooperation through mathematical models and
authentication scheme in which the authentication is considered
abstractions.
as a non-cooperative non-zero-sum bi-matrix game. Three
strategies are developed for each player, and the best-response Bluetooth networks are proliferating in our society.
strategies (also called Nash equilibrium) for this game are Unfortunately, the Bluetooth security has many weaknesses.
computed. Using Simplex algorithm, we find only one Nash Del Vecchio and El Kadhi [8] explain many attacks based
equilibrium corresponding to the case where both Bluetooth on the Bluetooth protocol and Bluetooth software
devices are authentic and trying to securely communicate implementations.
together. In a Nash equilibrium, no player has an incentive to The application of game theory to networks security has
deviate from such situation. Then, we generalize our been gaining increasing interest within the past few years.
authentication method to other protocols. For example, Syverson [14] talks about “good” nodes
fighting “evil” nodes in networks and suggests using game
Keywords: Computer/Communications Protocols, ISO theory for reasoning. In [3], Browne describes how game
(International Standards Organization), Bluetooth security, theory can be used to analyze attacks involving complicated
Bluetooth authentication, game theory, Nash equilibrium, and heterogeneous military networks. Buike [4] studies the
Transport Layer Protocol. use of games to model attackers and defenders in
information warfare.
1. Introduction In this paper, we focus on the vulnerability of the
The growth of Information Technology role in various Bluetooth authentication. Since such process is unilateral, a
aspects of our lives in various areas has been increasing malicious Verifier can considerably damage its
rapidly. This in turn increased the importance of having correspondent menacing the operability of that device on the
digital information bases and have electronic connectivity one hand and, the confidentiality and the integrity of the
between various sites of the same organization and between data exchanged on the other hand. To counter this
various organizations. These may be spread over multiple weakness, a game-theoretic framework is used to model a
networks in different countries in different contents [16, 17]. bidirectional authentication between two Bluetooth devices.
This in turn, significantly and substantially increased Using the Nash equilibrium concept, a secure authentication
the importance of having security guarantees for these process is defined in which the authentication is successful
information data bases and electronic connectivity. if and only if both devices are trusted. This paper is
Unfortunately, the security risks have also increased. This structured as following: First, Bluetooth protocol is reviewed
triggered the Research on & Development of security with a focus on its security procedures and vulnerabilities in
methods and systems to provide security guarantees to the section 2. Then, section 3 is dedicated to a background on
communicating users and users of the information data game theory. Next, in section 4 we introduce our game-
bases. This includes the work on developing authentication theoretic model, then some results are presented in section
methods to authenticate the identity of the communicating 5. The new bidirectional Bluetooth authentication protocol
parties [1]. is described in section 6. In Section 7, we generalize our
The explosive growth of electronic connectivity and intelligent authentication method to other protocols. Section
wireless technologies revolutionized our society. Bluetooth 8, presents concluding remarks.
is one of these technologies. It is a recently proposed
standard [8] that allows for local wireless communication
and facilitates the physical connection of different devices
[2]. Unfortunately, this wireless environment attracted many
(IJCNS) International Journal of Computer and Network Security, 65
Vol. 2, No. 10, 2010
2. An overview of the Bluetooth security exchanged [15]. The authentication process is shown in
figure 1:
4. Results
After optimal results are computed by the Simplex
resolution, the algorithm matchs Verifier and Claimant
probabilities with the mutual best-response
correspondence(MBi?y (r, s) and MBRc(p,q)). The Claimant
probability r = 173 corresponds to the case where Tv is the
best-strategy for the Verifier. In fact, r is greater than 38s
and also greater than 1s. Analogously, the Verifier
probability p = 173 yields the case where Tc is the Claimant’s
best-strategy. In fact, p is greater than 389 and also greater
than 15q. Thus, the mixed-strategy Nash equilibrium of our
game corresponds to the situation where telling the truth
and cooperating is the best-strategy for both players.
Consequently, the best strategy for the Verifier is Tv and the
best strategy for the Claimant is Tc and both players have no
incentive to deviate from this situation. This means that
according to our bidirectional authentication, the two
Bluetooth devices in communication are better off trusting
each other.
Connection Process
establishment phase AuthenticatedTPC0[tcreq,tdind,cr,cc,tccon,dr,ndind,tdreq,dt
,tdatr,ndreq] :no exit
idle
:= ( ?tcreq; !tdind;
connected TPC0[tcreq,tdind,cr,cc,tccon,ndind,tdreq,dt,tdatr,ndreq]
[] ?tcreq; !cr; ( ( ?dr; !tdind;
Disconnection phase TPC0[tcreq,tdind,cr,cc,tccon,dr,ndind,tdreq,dt,ndreq] )
[] (?cc; !tccon; exit)))
Data transfer phase >> ((Authentication_Data_phase[tdatr,dt]) [>
Disconnection_phase[tdreq,ndreq,ndind,tdind] )
Figure 3. Block Diagram representing normal ISO endproc
Transport Layer protocol where
Referring to the ISO Transport Layer protocol given in Process Authentication_Data_phase[RV,RC,SR2,tdatr,dt]
Lotos in [16, 17], we have the following: ::exit = ( !RV; ?RC; SR2; (i; ?tdatr; i; Data_phase[tdatr,dt])
Consider the Lotos specification for Class 0 transport [] (i; Disconnection_phase[tdreq,ndreq,ndind,tdind])
protocol to the case where the protocol entity is the initiator. [] (!RV; ?RC; SR2; (i; ?dt; i; Data_phase[tdatr,dt])
Process [] (i; Disconnection_phase[tdreq,ndreq,ndind,tdind]))
TPC0[tcreq,tdind,cr,cc,tccon,dr,ndind,tdreq,dt,tdatr,ndreq] endproc
:no exit := ( ?tcreq; !tdind; Process Disconnection[tdreq,ndreq,ndind,tdind[
TPC0[tcreq,tdind,cr,cc,tccon,ndind,tdreq,dt,tdatr,ndreq] ::no exit :=
[] ?tcreq; !cr; ( ( ?dr; !tdind; ?tdreq; !ndreq;
TPC0[tcreq,tdind,cr,cc,tccon,dr,ndind,tdreq,dt,ndreq] ) TPC0[tcreq,tdind,cr,cc,tccon,dr,ndind,tdreq,dt,tdatr,ndreq]
[] (?cc; !tccon; exit))) [] ?ndind; !tdind;
>> (Data_phase[tdatr,dt] [> TPC0[tcreq,tdind,cr,cc,tccon,dr,ndind,tdreq,dr,tdatr,ndreq]
Disconnection_phase[tdreq,ndreq,ndind,tdind] ) Endproc
endproc
where 8. Conclusions
Process Data_phase[tdatr,dt] ::exit = ?tdatr; i; In this work, we present a solution to strengthen the
Data_phase[tdatr,dt] Bluetooth security as well as other protocols including those
[] ?dt; i; Data_phase[tdatr,dt] for the wired networks. A classical Bluetooth authentication
endproc is unidirectional and consequently is vulnerable to malicious
Process Disconnection[tdreq,ndreq,ndind,tdind[ ::no exit := device attacks. The idea is to propose a bidirectional
?tdreq; !ndreq; authentication scheme. Game theory is useful for such
TPC0[tcreq,tdind,cr,cc,tccon,dr,ndind,tdreq,dt,tdatr,ndreq] modelisation since it is a global framework with formal
[] ?ndind; !tdind; opportunities for real-life problem representations. Thus, the
TPC0[tcreq,tdind,cr,cc,tccon,dr,ndind,tdreq,dr,tdatr,ndreq] authentication between two Bluetooth devices is viewed as a
endproc game. The new bidirectional authentication is modeled as a
Applying our authentication scheme and our extension, we simultaneous two-players game (bi-matrix). The possible
get the following specifications: strategies for each player are defined (based on some
security parameters check) and formulated with the utility
Connection function. Such function affects some costs and rewards
Idle
establishment Ua-
phase
values for each player depending on its strategy and its
connected
correspondent’s. Then, each players’ best-strategy are com-
puted (defining the Nash equilibrium). The algorithm uses
the Simplex technique to calculate players’ total gains.
Recall that in such conditions only one Nash equilibrium
Au- Authentication phase
connected
can be derived. This equilibrium corresponds to the case
where both players are telling the truth. In Bluetooth
security terms, two devices have to be trusted during
bidirectional authentication. In other words, the
bidirectional authentication is successful if and only if both
devices are authentic. To implement this protocol, two
issues are possible: outside the Bluetooth core protocol (in
Data transfer phase Disconnection phase the application layer) or within the Bluetooth core protocol
(in the LMP layer). In the first case, the classical Bluetooth
authentication will be replaced by our bidirectional
authentication. When considering the second view, some
changes in the cryptographic function used during a
Idle classical Bluetooth authentication are necessary in order to
Figure 4: Block Diagram of the Extended ISO Transport incorporate the described model. We are finalizing some
Layered protocol with Authenticaion benchmarks to compare the efficiency between our
70 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010
algorithm and the standard Bluetooth authentication model. [14] Syverson, P. F. (1997). A different look at secure
Our work can be extended in different ways. For example, distributed computation. In Proc. 10th IEEE Computer
we can model our bidirectional authentication as an N- Security Foundations Workshop.
player game. According to such model, an authentication [15](2003) Bluetooth: threats and security measures.
process can be performed between many devices at the same Bundesant fr Sicherheit in der Informationstechnik,
time. This will be useful when piconets or scatternets are Local Wireless Communication Project Team, Ger-
formed. In addition, we can exploit extensive form in order many.
to describe dynamic behavior. A player will take into ac- [16] Hazem El-Gendy, “Formal Method for Automated
count the effect of its current behavior on the other players’ Transformation of Lotos Specifications to Estelle
future behavior. This principle can forewarn trusted Specifications”, International Journal of Software
Bluetooth devices of possible threats and malicious devices. Engineering & Knowledge Engineering, USA,
Also our model can be applied to any authentication process Vol. 15, No. 5, October 2005, pp. 1-19. 2005.
just by adapting the utility function parameters. [17] Hazem El-Gendy and Nabil El Kadhi, “Testing Data
Flow Aspects of Communications Protocols, Software,
References and Systems Specified in Lotos”, International Journal
[1] Alexoudi, M., Finlayson, E., & Griffiths, M. (2002). on Computing Methods in Science and Engineering,
Security in Bluetooth. Published in Greece, 2005.
[2] Bray, J., & Sturman, C. F. (2002). Bluetooth 1.1:
connect without cables. Second Edition, Prentice Hall
PTR (Eds.).
[3] Browne, R. (2000). C4i defensive infrastructure for
survivability against multi-mode attacks. In Proc. 21st
Century Military Communications - Architectures and
Technologies for Information Superiority.
[4] Buike, D. (1999). Towards a game theory model of
information warfare. Master’s Thesis, Technical
report, Airforce Institute of Technology
[5] Candolin, C. (2000). Security Issues for Wearable
Computing and Bluetooth Technology. Telecommu-
nications Software and Multimedia Laboratory,
Helsinky University of Technology, Finland.
[6] Cordeiro, C. M., Abhyankar, S., & Agrawal, D. P.
(2004). An enhanced and energy efficient commu-
nication architecture for Bluetooth wireless PANs.
Elsevier.
[7] De Kock, A. Bluetooth security. University Of Cape
Town, Department Of Computer Science, Network
Security.
[8] Del Vecchio, D., & El Kadhi, N. (2004). Bluetooth
Security Challenges, A tutorial. In proceedings of the
8th World Multi-Conference on Systemics, Cybernetics
and Informatics, Orlando, Florida, USA.
[9] Kitsos, P., Sklavos, N., Papadomanolakis, K., &
Koufopavlou, O. (2003) Hardware Implementation of
Bluetooth Security. IEEE CS and IEEE Commu-
nications Society, IEEE Pervasive Computing.
[10] Muller, T. (1999). Bluetooth security architecture -
Version 1.0. Bluetooth white paper.
[11] Osborne, M.-J., & Rubinstein, A. (1994). A course in
game theory. Massachusetts Institute of Technology.
[12] Persson, J., & Smeets, B. (2000). Bluetooth security -
An overview. Ericsson Mobile Communications AB,
Ericsson Research, Information Security Technical
Report, Vol 5, No. 3, pp. 32-43.
[13] Pnematicatos, G. (2004). Network and InterNetwork
Security: Bluetooth Security.