Page 180 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 180

Fortunately,  Bluetooth®  Mesh  incorporates  multiple  layers  of  encryption,  authentication,  and  privacy
            protection to safeguard networks from cyber threats.

            1. Strong Encryption & Authentication

            Bluetooth® Mesh ensures that all communication is encrypted to prevent unauthorized access. It uses
            AES-128 encryption with Counter with CBC-MAC (CCM) to protect data transmitted across the network.
            Even if an attacker intercepts a message, they cannot read or modify it without the correct encryption
            keys.


            Each message also contains a message integrity check (MIC) to verify its authenticity. This prevents
            attackers  from  injecting  fake  messages  or  altering  commands  sent  between  devices.  Additionally,
            Bluetooth®  Mesh  protects  against  replay  attacks  by  using  sequence  numbers—ensuring  that  older
            messages cannot be resent by an attacker to manipulate devices.

            2. Secure Device Provisioning

            Before a device can join a Bluetooth® Mesh network, it must go through a secure provisioning process
            to prove its authenticity. This process includes:

               •  Out-of-Band (OOB) authentication, such as QR codes or NFC, to verify legitimate devices.
               •  Elliptic  Curve  Diffie-Hellman  (ECDH)  encryption,  ensuring  that  device  provisioning  is  secure
                   against man-in-the-middle (MITM) attacks.

            Unlike  some  IoT  systems  that  rely  on  default  passwords  or  pre-configured  security  credentials,
            Bluetooth® Mesh ensures that all devices establish secure keys during provisioning, preventing attackers
            from exploiting weak authentication.


            3. Network-Level Security

            Bluetooth® Mesh networks use a three-tiered key system to provide strong security at different levels:

               •  Network Key (NetKey): Encrypts messages at the network level, ensuring all devices in the mesh
                   are authenticated.
               •  Application Key (AppKey): Used for specific applications, preventing unauthorized devices from
                   accessing sensitive functions (e.g., lighting control vs. security systems).
               •  Device Key (DevKey): Assigned to each device during provisioning, preventing rogue devices
                   from impersonating others.

            If a device is compromised, Bluetooth® Mesh supports a key refresh mechanism, allowing administrators
            to generate new encryption keys and remove unauthorized devices from the network.

            4. Privacy Protection

            To prevent tracking and data theft, Bluetooth® Mesh devices use randomized source addresses that
            change periodically. This prevents attackers from identifying or tracking specific devices based on their
            network activity.







                                                                                                            180
   175   176   177   178   179   180   181   182   183   184   185