CFP last date
20 May 2024
Reseach Article

Enhancing Bluetooth Authentication using Diffie Hellman Algorithm

by Rajveer Kaur, Rupinder Kaur Cheema
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 18
Year of Publication: 2013
Authors: Rajveer Kaur, Rupinder Kaur Cheema
10.5120/11681-7308

Rajveer Kaur, Rupinder Kaur Cheema . Enhancing Bluetooth Authentication using Diffie Hellman Algorithm. International Journal of Computer Applications. 68, 18 ( April 2013), 30-34. DOI=10.5120/11681-7308

@article{ 10.5120/11681-7308,
author = { Rajveer Kaur, Rupinder Kaur Cheema },
title = { Enhancing Bluetooth Authentication using Diffie Hellman Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 18 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number18/11681-7308/ },
doi = { 10.5120/11681-7308 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:28:14.339310+05:30
%A Rajveer Kaur
%A Rupinder Kaur Cheema
%T Enhancing Bluetooth Authentication using Diffie Hellman Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 18
%P 30-34
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Bluetooth is a technology for connecting devices wirelessly to achieve data transfer at the rate of 720 kbps within a range of 10 to 100 meters. In existing authentication procedure for Bluetooth networks, four levels of key generation viz initialization key , combination key, link key, encryption key were incorporated. Bluetooth devices have limited resources, so we need a small authentication procedure. We proposed a new authentication scheme for Bluetooth networks. We presented enhancement in the authentication procedure of Bluetooth by using Diffie-Hellman Algorithm. This novel authentication procedure acts as the countermeasure against SNARF attack by the introduction of Diffie Hellman algorithm.

References
  1. KEIJO HAATAJA "Security Threats and Countermeasures in Bluetooth-Enabled Systems" Department of Computer Science University of Kuopio 2009
  2. Bin Zhen, Jonghun Park and Yongsuk Kim "Scatternet Formation of Bluetooth Ad Hoc Networks" i-Networking Lab, Samsung Advanced Institute of Technology, YongIn city, 440-600, Korea 2003
  3. John D. Padgette "Bluetooth security in the DOD" Booz Allen Hamilton Herndon, VA, April 19, 2009
  4. Pushpa R S uri Sona Rani "Symmetric Key Insecurity in Bluetooth Communication" Department of Computer Science and Applications, Kurukshetra University, kurukshetra, Haryana,INDIA.
  5. Mostafa Akhavan-E-saffar, Vahid Tabataba Vakily "Improvement Bluetooth Authentication and pairing protocol using Encrypted Key Exchange and Station-to-Station MAC Protocols" 2009 international conference on machine learning and computing
  6. Deepak Jayanna, Gergely V. Záruba "A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets" Department of Computer Science and Engineering, The University of Texas at Arlington 2005
  7. Zhifang Wang, Robert J. Thomas, Zygmunt Haas "Bluenet – a New Scatternet Formation Scheme" ECE Cornell Univ, Ithaca, NY, 14853, Proceedings of the 35th Hawaii International Conference on System Sciences – 2002
  8. Karl E Persson and D. Manivannan "Secure Connections in Bluetooth Scatternets" Computer Science Department University of Kentucky Lexington, KY 40506, 2003
  9. K. E. Persson, D. Manivannan, M. Singhal "Bluetooth scatternets: criteria, models and classification" Laboratory for Advanced Networking, Department of Computer Science, University of Kentucky, Lexington, KY 40506, 2004
  10. Sanif Sentosa Liong, Payam M. Barnaghi "Bluetooth Network Security: A New Approach to Secure Scatternet Formation" School of Computer Science and Information Technology, the University of Nottingham Malaysia Campus Kuala Lumpur, Malaysia
  11. Will Garner "Diffie-Hellman Key Exchange"
  12. Inigo Puy "Bluetooth" 2008
  13. James Lewis "Bluetooth Security" ECE 578 7 March 2005
  14. Pushpa R Suri Sona Rani "Symmetric Key Insecurity in Bluetooth Communication" Department of Computer Science and Applications, Kurukshetra University, kurukshetra, Haryana, INDIA.
  15. Zhifang Wang, Robert J. Thomas, Zygmunt Haas "Bluenet new Scatternet Formation Scheme" ECE Cornell Univ, Ithaca, NY, 14853, Proceedings of the 35th Hawaii International Conference on System Sciences – 2002
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Algorithm Diffie-Hellman SNARF