An Architecture Design for Wireless Authentication Security in Bluetooth Network

被引:3
|
作者
Mandal, Bijoy Kumar [1 ]
Bhattacharyya, Debnath [1 ]
Kim, Tai-Hoon [2 ]
机构
[1] NSHM Knowledge Campus, Fac Engn & Technol, Dept Comp Sci & Engn, Durgapur 713212, India
[2] Sungshin Womens Univ, Dept Convergence Secur, 249-1,Dongseon Dong 3 Ga, Seoul 136742, South Korea
关键词
Bluetooth Security; MITM; UDDA; SIG; ACO; Link Key; PIN;
D O I
10.14257/ijsia.2014.8.3.01
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bluetooth technology has become an integral part of this modern society. Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. Bluetooth communication range is categorized as high, medium and low depending upon power level. High range of Bluetooth communication is up to 91 meter, medium range is up to 9 meter and low range is up to 1 meter. Authentication and Encryption are the key security features that are used in Bluetooth communication. In this paper, we present architecture for authentication security of Bluetooth. The main goal of this paper is to design architecture of security for Bluetooth in real scenarios. In order to find out the major vulnerabilities in modern wireless Bluetooth-enabled devices that has performed successfully for several attacks such as Unauthorized Direct Data Access (UDDA) and Man-in-the-Middle Attack (MITM). This form of authentication presents an interesting modeling challenge. We discuss the implications of this authentication security for typical Bluetooth usage scenarios.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] A Design Approach for Wireless Communication Security in Bluetooth Network
    Mandal, Bijoy Kumar
    Bhattacharyya, Debnath
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 341 - 352
  • [2] A Security Architecture Based on User Authentication of Bluetooth
    Xin, Yu
    Ting, Yan
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 627 - +
  • [3] The design and study of a low coupling wireless sensor network authentication architecture
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu
    611731, China
    不详
    Yunnan
    650201, China
    不详
    650091, China
    Int. J. Simul. Syst. Sci. Technol., 5A (7.1-7.4):
  • [4] Wireless network security architecture
    Blumenthal, U
    Marcovici, M
    Mizikovsky, S
    Patel, S
    Sundaram, GS
    Wong, M
    BELL LABS TECHNICAL JOURNAL, 2002, 7 (02) : 19 - 36
  • [5] An implementation of wireless sensor network for security system using Bluetooth
    Choi, SH
    Kim, BK
    Park, J
    Kang, CH
    Eom, DS
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) : 236 - 244
  • [6] Review on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security
    Ghori, Muhammad Rizwan
    Wan, Tat-Chee
    Anbar, Mohammed
    Sodhy, Gian Chand
    Rizwan, Amna
    2019 17TH IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED), 2019, : 219 - 224
  • [7] A security architecture for attacks detection and authentication in wireless mesh networks
    Parveen Kumar Sharma
    Rajiv Mahajan
    Cluster Computing, 2017, 20 : 2323 - 2332
  • [8] A security architecture for attacks detection and authentication in wireless mesh networks
    Sharma, Parveen Kumar
    Mahajan, Rajiv
    Surender
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2323 - 2332
  • [9] The efficient security architecture for authentication and authorization in the home network
    Lee, Hyungkyu
    Lee, Jooyoung
    Han, Jongwook
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 5, PROCEEDINGS, 2007, : 713 - +
  • [10] A New Bluetooth Security Architecture
    Philip, Mintu
    Das, Asha
    TRENDS IN COMPUTER SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY, 2011, 204 : 507 - 515