New Efficient Bluetooth Authentication Scheme

  • Mustafa S. Kadhm 1Computer Engineering Techniques, Imam Ja'afar Al-Sadiq University, Baghdad, Iraq
  • Suphian Mohammed Tariq 4Department of Computer Engineering, College of Engineering, Al-Iraqia University, Baghdad, Iraq
  • Hayder Ayad Department College of Business Administration, AL-Bayan University, Baghdad, Iraq
  • Fouad Abdulrazak Department of Computer Engineering, College of Engineering, Al-Iraqia University, Baghdad, Iraq
الكلمات المفتاحية: Bluetooth, Authentication Scheme

الملخص

Bluetooth can be described as a wireless connection used for transferring data from ten to one hundred meters distance with transfer speed around 720kbps. The current validated Bluetooth network process, consists of four stages, key generations for launching key, link key, combining and encrypting key has been included. Small authenticated process will be needed due to the limitation of resources that Bluetooth equipments own. A new authenticated scheme has been suggested for the net of the Bluetooth. Diffie-Hellman Algorithm was used to enhance the authentication process of Bluetooth. This creative authentication process eliminates the effect of the SNARF attacks which stem from the preface of Diffie Hellman algorithm.

المراجع

[1] KEIJO HAATAJA “Security Threats and Countermeasures in Bluetooth-Enabled Systems” Department of Computer Science University of Kuopio 2009 .
[2] Bin Zhen, Jonghun Park and Yongsuk Kim “Scatternet Formation of Bluetooth Ad Hoc Networks” i-Networking Lab, Samsung Advanced Institute of Technology, YongIn city, 440-600, Korea 2003 .
[3] John D. Padgette “Bluetooth security in the DOD” Booz Allen Hamilton Herndon, VA, April 19, 2009.
[4] Pushpa R S uri Sona Rani “Symmetric Key Insecurity in Bluetooth Communication” Department of Computer Science and Applications, Kurukshetra University, kurukshetra, Haryana,INDIA.
[5] Mostafa Akhavan-E-saffar, Vahid Tabataba Vakily “Improvement Bluetooth Authentication and pairing protocol using Encrypted Key Exchange and Station-to-Station MAC Protocols” 2009 international conference on machine learning and computing .
[6] Deepak Jayanna, Gergely V. Záruba “A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets” Department of Computer Science and Engineering, The University of Texas at Arlington 2005.
[7] Zhifang Wang, Robert J. Thomas, Zygmunt Haas “Bluenet – a New Scatternet Formation Scheme” ECE Cornell Univ, Ithaca, NY, 14853, Proceedings of the 35th Hawaii International Conference on System Sciences – 2002
[8] Karl E Persson and D. Manivannan “Secure Connections in Bluetooth Scatternets” Computer Science Department University of Kentucky Lexington, KY 40506, 2003 .
[9] K.E. Persson, D. Manivannan, M. Singhal “Bluetooth scatternets: criteria, models and classification” Laboratory for Advanced Networking, Department of Computer Science, University of Kentucky, Lexington, KY 40506, 2004
[10] Sanif Sentosa Liong, Payam M. Barnaghi “Bluetooth Network Security: A New Approach to Secure Scatternet Formation” School of Computer Science and Information Technology, the University of Nottingham Malaysia Campus Kuala Lumpur, Malaysia
[11] Will Garner “Diffie-Hellman Key Exchange” .
[12] Inigo Puy “Bluetooth” 2008
[13] James Lewis “Bluetooth Security” ECE 578 7 March 2005
[14] Pushpa R Suri Sona Rani “Symmetric Key Insecurity in Bluetooth Communication” Department of Computer Science and Applications, Kurukshetra University, kurukshetra, Haryana, INDIA.
[15] Zhifang Wang, Robert J. Thomas, Zygmunt Haas “Bluenet new Scatternet Formation Scheme” ECE Cornell Univ, Ithaca, NY, 14853, Proceedings of the 35th Hawaii International Conference on System Sciences – 2002.
منشور
2022-03-17
القسم
المقالات