An Architecture Design for Wireless Authentication Security in Bluetooth Network

被引:3
|
作者
Mandal, Bijoy Kumar [1 ]
Bhattacharyya, Debnath [1 ]
Kim, Tai-Hoon [2 ]
机构
[1] NSHM Knowledge Campus, Fac Engn & Technol, Dept Comp Sci & Engn, Durgapur 713212, India
[2] Sungshin Womens Univ, Dept Convergence Secur, 249-1,Dongseon Dong 3 Ga, Seoul 136742, South Korea
关键词
Bluetooth Security; MITM; UDDA; SIG; ACO; Link Key; PIN;
D O I
10.14257/ijsia.2014.8.3.01
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bluetooth technology has become an integral part of this modern society. Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. Bluetooth communication range is categorized as high, medium and low depending upon power level. High range of Bluetooth communication is up to 91 meter, medium range is up to 9 meter and low range is up to 1 meter. Authentication and Encryption are the key security features that are used in Bluetooth communication. In this paper, we present architecture for authentication security of Bluetooth. The main goal of this paper is to design architecture of security for Bluetooth in real scenarios. In order to find out the major vulnerabilities in modern wireless Bluetooth-enabled devices that has performed successfully for several attacks such as Unauthorized Direct Data Access (UDDA) and Man-in-the-Middle Attack (MITM). This form of authentication presents an interesting modeling challenge. We discuss the implications of this authentication security for typical Bluetooth usage scenarios.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [31] Wireless sensor architecture uses bluetooth standard
    Allan, R
    ELECTRONIC DESIGN, 2000, 48 (16) : 78 - +
  • [32] A Quantum Secure Entity Authentication Protocol Design for Network Security
    Paul, Surjit
    Kumar, Sanjay
    Suman, Rajiv Ranjan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (04) : 1 - 11
  • [33] Security architecture based on immunity principle for wireless sensor network
    Li, Yu-Ying
    Dong, Xiao-Mei
    Li, Xiao-Hua
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2010, 31 (SUPPL. 2): : 197 - 200
  • [34] Wireless sensor network security: A secure sink node architecture
    Muhammad, S
    Furqan, Z
    Guha, R
    CONFERENCE PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE, 2005, : 371 - 376
  • [35] Wireless Sensor Network Using Bluetooth
    Javeri, Omkar
    Jeyakumar, Amutha
    ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL, 2011, 125 : 424 - 432
  • [36] Security authentication protocol for WiMAX wireless network based on protocol composition logic
    Feng T.
    Zhang Z.-B.
    Ma J.-F.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (09): : 2106 - 2111
  • [37] Provable security authentication scheme based on public key for heterogeneous wireless network
    Hou, Hui-Fang
    Liu, Guang-Qiang
    Ji, Xin-Sheng
    Zhang, Qiu-Wen
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (10): : 2385 - 2391
  • [38] Multimedia contents security by wireless authentication
    Kim, Jung Jae
    Lee, Kwang Hyoung
    Min, So Yeon
    Jee, Jeong Gyu
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 936 - 945
  • [39] Design, architecture and performance evaluation of the wireless transport layer security
    Sklavos, N.
    Kitsos, P.
    Papadopoulos, K.
    Koufopavlou, O.
    JOURNAL OF SUPERCOMPUTING, 2006, 36 (01): : 33 - 50
  • [40] Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security
    N. Sklavos
    P. Kitsos
    K. Papadopoulos
    O. Koufopavlou
    The Journal of Supercomputing, 2006, 36 : 33 - 50