Security - Protocol

BubblyNet Security, which accurately complies with the Bluetooth Mesh Security Standards, is considered by many engineers the highest level of security available today for a wireless commercial lighting control system.

All messages are encrypted and authenticated.

In Bluetooth Mesh, security is mandatory. Failing to implement the mandated protocol security for Bluetooth Mesh nodes is a violation which precludes usage of the Bluetooth Mesh trademark.

Secure Architecture

BubblyNet uses a distributed architecture which makes the network intrinsically more secure than one based on a centralized or decentralized architecture.

Every node of the network, in order to operate, needs to have its own Device Encryption Key, the Application Encryption Key of its main function, and the Network Encryption Key of the Network.

The break of security of one key would not allow for operating the network as two keys are needed.

The break of security on one device would not allow for the control of the entire network as the additional keys would be missing.

All messages are secured using AES-CCM 128-bit encryption.

Secure Network

When creating a network a Network Key is generated. When a device is added to the network, the Network Key, Application Key and Device Key for that device are bound and from that moment on, the device is enclosed into the encrypted network and is no longer discoverable by a provisioner.

The provisioning of a device use 256-bit elliptical encryption and OOB (Out Of Band) authentication.

Replay / Man-in-the-middle protection

The Bluetooth Mesh specification requires that all messages be unique from each other to prevent man-in-middle attacks. This is achieved by adding a Nonce to every message that is sent. A Nonce is a unique number generated by two main inputs, a sequence number, and an IV index. The sequence number is a value that is shared between two nodes on a network. Every time a node receives a message, it increments its sequence number. The two nodes must stay next to each other in sequence number otherwise the message will be discarded and assumed to be a replayed message. Sequence numbers have a maximum value, so in order to prevent wrap-around, an IV index number is kept throughout the whole network. When a node is reaching the end of usable sequence numbers, it initiates an IV index procedure to notify all nodes in the network to reset the Sequence number back to 0x0000 and use the new IV index. This allows a mesh network to run for billions of years before running out of unique messages. An attacker is not able to see the current IV index and Sequence number without having the network key. This prevents them from generating a message with a valid sequence number and IV index. 

Trashcan protection

If a device is lost or stolen from a network a key refresh can be initiated. This replaces all NetKeys and AppKeys on a network. Even if someone is able to physically recover the keys from a device they will not be able to use those after a key refresh has been completed.

Visitor protection

Visitors can be added to a network by adding them to their own subnet. A subnet has its own NetKey and Appkey. This isolates them from the rest of the network allowing them to only control what they have been given access to. To remove the visitor from the network all that needs to be done is delete the subnet keys from the devices that the visitor had access to.

BubblyNet devices are ioXt certified.

IoXt is a worldwide alliance of leading companies in the Internet of Things space such as Amazon, IBM and Google. It is the global standard for IoT security. https://www.ioxtalliance.org/