MagicPairing: Apple's Take on Securing Bluetooth Peripherals

05/14/2020
by   Dennis Heinze, et al.
0

Device pairing in large Internet of Things (IoT) deployments is a challenge for device manufacturers and users. Bluetooth offers a comparably smooth trust on first use pairing experience. Bluetooth, though, is well-known for security flaws in the pairing process. In this paper, we analyze how Apple improves the security of Bluetooth pairing while still maintaining its usability and specification compliance. The proprietary protocol that resides on top of Bluetooth is called MagicPairing. It enables the user to pair a device once with Apple's ecosystem and then seamlessly use it with all their other Apple devices. We analyze both, the security properties provided by this protocol, as well as its implementations. In general, MagicPairing could be adapted by other IoT vendors to improve Bluetooth security. Even though the overall protocol is well-designed, we identified multiple vulnerabilities within Apple's implementations with over-the-air and in-process fuzzing.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/29/2020

SAFER: Development and Evaluation of an IoT Device Risk Assessment Framework in a Multinational Organization

Users of Internet of Things (IoT) devices are often unaware of their sec...
research
08/11/2022

Improving Tourist Experience Through an IoT Application Based on FatBeacons

This paper describes the use of a new extension of the Bluetooth connect...
research
06/03/2022

Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption

In many Internet of Things (IoT) applications, data sensed by an IoT dev...
research
06/30/2023

A Quic(k) Security Overview: A Literature Research on Implemented Security Recommendations

Built on top of UDP, the relatively new QUIC protocol serves as the base...
research
04/15/2019

Model-Based Testing IoT Communication via Active Automata Learning

This paper presents a learning-based approach to detecting failures in r...
research
06/27/2019

Flexible Anonymous Network

Internet technologies have been designed from guidelines like the robust...
research
08/22/2018

Optical TEMPEST

Research on optical TEMPEST has moved forward since 2002 when the first ...

Please sign up or login with your details

Forgot password? Click here to reset