Revisiting Bluetooth Security

被引:0
|
作者
Das, Manik Lal [1 ]
Mukkamala, Ravi [2 ]
机构
[1] Dhirubhai Ambani Inst Informat & Commun Technol, Gandhinagar 382007, India
[2] Old Dominion Univ, Dept Comp Sci, Norfolk, VA 23529 USA
来源
关键词
Bluetooth technology; Bluetooth security; Authentication; Privacy; Wireless communications;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bluetooth technology is gaining increasing interest in the research community because of the convenience of exchanging information between wireless devices. As the communication medium is wireless; security is an important concern in this emerging technology. This paper discusses the basic security of Bluetooth technology, some of its shortcomings and presents two new proposals for securing Bluetooth technology. One of the proposals is based on passkey-authenticated key exchange, where security relies on keyed hash function, and the other one is on amplified passkey-authenticated key exchange, where security relies on elliptic curve discrete logarithms problem. The latter provides some additional security services, but with added cost compared to the former one. Both protocols provide mutual authentication, resist known and possible threats, and achieve efficiency compared to other protocols.
引用
收藏
页码:132 / +
页数:2
相关论文
共 50 条
  • [1] Bluetooth and security
    Ivo, P
    [J]. MICROWAVE AND OPTICAL TECHNOLOGY 2003, 2003, 5445 : 55 - 59
  • [2] BLUETOOTH SECURITY IN THE DOD
    Padgette, John D.
    [J]. MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 2425 - 2430
  • [3] Security weaknesses in Bluetooth
    Jakobsson, M
    Wetzel, S
    [J]. TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 176 - 191
  • [4] A New Bluetooth Security Architecture
    Philip, Mintu
    Das, Asha
    [J]. TRENDS IN COMPUTER SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY, 2011, 204 : 507 - 515
  • [5] Bluetooth -: Technology, security and weaknesses
    Löhlein, B
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS I, 2002, : 191 - 196
  • [6] Hardware implementation of bluetooth security
    Kitsos, P
    Sklavos, N
    Papadomanolakis, K
    Koufopavlou, O
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 21 - 29
  • [7] Demonstrating vulnerabilities in Bluetooth security
    Hager, CT
    Midkiff, SF
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1420 - 1424
  • [8] Security threats in Bluetooth technology
    Hassan, Shaikh Shahriar
    Das Bibon, Soumik
    Hossain, Md Shohrab
    Atiquzzaman, Mohammed
    [J]. COMPUTERS & SECURITY, 2018, 74 : 308 - 322
  • [9] Reserch of Bluetooth Security Manager
    Ma, K
    Cao, XY
    [J]. PROCEEDINGS OF 2003 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS & SIGNAL PROCESSING, PROCEEDINGS, VOLS 1 AND 2, 2003, : 1681 - 1684
  • [10] An analysis of Bluetooth security vulnerabilities
    Hager, CT
    Midkiff, SF
    [J]. WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1825 - 1831