New Efficient Bluetooth Authentication Scheme
Keywords:Bluetooth, Authentication Scheme
Bluetooth can be described as a wireless connection used for transferring data from ten to one hundred meters distance with transfer speed around 720kbps. The current validated Bluetooth network process, consists of four stages, key generations for launching key, link key, combining and encrypting key has been included. Small authenticated process will be needed due to the limitation of resources that Bluetooth equipments own. A new authenticated scheme has been suggested for the net of the Bluetooth. Diffie-Hellman Algorithm was used to enhance the authentication process of Bluetooth. This creative authentication process eliminates the effect of the SNARF attacks which stem from the preface of Diffie Hellman algorithm.
 Bin Zhen, Jonghun Park and Yongsuk Kim “Scatternet Formation of Bluetooth Ad Hoc Networks” i-Networking Lab, Samsung Advanced Institute of Technology, YongIn city, 440-600, Korea 2003 .
 John D. Padgette “Bluetooth security in the DOD” Booz Allen Hamilton Herndon, VA, April 19, 2009.
 Pushpa R S uri Sona Rani “Symmetric Key Insecurity in Bluetooth Communication” Department of Computer Science and Applications, Kurukshetra University, kurukshetra, Haryana,INDIA.
 Mostafa Akhavan-E-saffar, Vahid Tabataba Vakily “Improvement Bluetooth Authentication and pairing protocol using Encrypted Key Exchange and Station-to-Station MAC Protocols” 2009 international conference on machine learning and computing .
 Deepak Jayanna, Gergely V. Záruba “A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets” Department of Computer Science and Engineering, The University of Texas at Arlington 2005.
 Zhifang Wang, Robert J. Thomas, Zygmunt Haas “Bluenet – a New Scatternet Formation Scheme” ECE Cornell Univ, Ithaca, NY, 14853, Proceedings of the 35th Hawaii International Conference on System Sciences – 2002
 Karl E Persson and D. Manivannan “Secure Connections in Bluetooth Scatternets” Computer Science Department University of Kentucky Lexington, KY 40506, 2003 .
 K.E. Persson, D. Manivannan, M. Singhal “Bluetooth scatternets: criteria, models and classification” Laboratory for Advanced Networking, Department of Computer Science, University of Kentucky, Lexington, KY 40506, 2004
 Sanif Sentosa Liong, Payam M. Barnaghi “Bluetooth Network Security: A New Approach to Secure Scatternet Formation” School of Computer Science and Information Technology, the University of Nottingham Malaysia Campus Kuala Lumpur, Malaysia
 Will Garner “Diffie-Hellman Key Exchange” .
 Inigo Puy “Bluetooth” 2008
 James Lewis “Bluetooth Security” ECE 578 7 March 2005
 Pushpa R Suri Sona Rani “Symmetric Key Insecurity in Bluetooth Communication” Department of Computer Science and Applications, Kurukshetra University, kurukshetra, Haryana, INDIA.
 Zhifang Wang, Robert J. Thomas, Zygmunt Haas “Bluenet new Scatternet Formation Scheme” ECE Cornell Univ, Ithaca, NY, 14853, Proceedings of the 35th Hawaii International Conference on System Sciences – 2002.