An Architecture Design for Wireless Authentication Security in Bluetooth Network

被引:3
|
作者
Mandal, Bijoy Kumar [1 ]
Bhattacharyya, Debnath [1 ]
Kim, Tai-Hoon [2 ]
机构
[1] NSHM Knowledge Campus, Fac Engn & Technol, Dept Comp Sci & Engn, Durgapur 713212, India
[2] Sungshin Womens Univ, Dept Convergence Secur, 249-1,Dongseon Dong 3 Ga, Seoul 136742, South Korea
关键词
Bluetooth Security; MITM; UDDA; SIG; ACO; Link Key; PIN;
D O I
10.14257/ijsia.2014.8.3.01
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bluetooth technology has become an integral part of this modern society. Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. Bluetooth communication range is categorized as high, medium and low depending upon power level. High range of Bluetooth communication is up to 91 meter, medium range is up to 9 meter and low range is up to 1 meter. Authentication and Encryption are the key security features that are used in Bluetooth communication. In this paper, we present architecture for authentication security of Bluetooth. The main goal of this paper is to design architecture of security for Bluetooth in real scenarios. In order to find out the major vulnerabilities in modern wireless Bluetooth-enabled devices that has performed successfully for several attacks such as Unauthorized Direct Data Access (UDDA) and Man-in-the-Middle Attack (MITM). This form of authentication presents an interesting modeling challenge. We discuss the implications of this authentication security for typical Bluetooth usage scenarios.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [41] Network layer security: Design for a cross layer architecture
    Ramachandran, S.
    Fairhurst, G.
    Luglio, M.
    Roseti, C.
    Provenzano, S.
    2007 INTERNATIONAL WORKSHOP ON SATELLITE AND SPACE COMMUNICATIONS, IWSSC '07, CONFERENCE PROCEEDINGS, 2007, : 271 - +
  • [42] On the design of a cost effective network security switch architecture
    Huang, NF
    Chen, CH
    Liu, RT
    Kao, CN
    Wu, CC
    GLOBECOM '05: IEEE Global Telecommunications Conference, Vols 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1012 - 1016
  • [43] Design of network security protection network architecture for intelligent networked vehicles
    Gao, Xiaoping
    Pan, Yue
    Li, Jinjin
    Ji, Tao
    Yuan, Yin
    Liu, Zhengnan
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 26 - 33
  • [44] Security Architecture for IEEE 802.15.4-based Wireless Sensor Network
    Shon, Taeshik
    Koo, Bonhyun
    Choi, Hyohyun
    Park, Yongsuk
    ISWPC: 2009 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING, 2009, : 294 - 298
  • [45] A Biometric-based Security for Data Authentication in Wireless Body Area Network (WBAN)
    Ramli, Sofia Najwa
    Ahmad, Rabiah
    Abdollah, Mohd Faizal
    Dutkiewicz, Eryk
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 998 - 1001
  • [46] Antenna for Wireless Area Network and Bluetooth Application
    Devi, Manju
    Singh, Vinod Kumar '
    Sharma, Sanjeev
    Bhoi, Akash Kumar
    ADVANCES IN COMMUNICATION, DEVICES AND NETWORKING, 2018, 462 : 377 - 384
  • [47] A reliable broadcast scheme for Bluetooth wireless network
    Sheu, ST
    Lee, HW
    Huang, CH
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XI, PROCEEDINGS: CONTROL, COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 18 - 22
  • [48] Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
    Martignon, Fabio
    Paris, Stefano
    Capone, Antonio
    COMPUTER NETWORKS, 2009, 53 (12) : 2192 - 2207
  • [49] A novel authentication protocol for wireless access security
    Wan C.
    Hu A.
    Zhang J.
    Journal of Convergence Information Technology, 2010, 5 (08) : 22
  • [50] Design and implementation of an enhanced security layer for bluetooth
    Hämäläinen, P
    Liu, N
    Sterling, R
    Hännikäinen, M
    Hämäläinen, TD
    CONTEL 2005: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2005, : 575 - 582