{"title":"Bluetooth security - Need to increase the efficiency in pairing","authors":"P. Suri, S. Rani","doi":"10.1109/SECON.2008.4494365","DOIUrl":null,"url":null,"abstract":"This paper focuses on the mechanism of Bluetooth authentication. When two units want to communicate in a secure way, they need to be paired to each other. In the pairing process units are exchanging keys and authenticate each other. We have mentioned about bluetooth security breaks and holes used by the attacker. Finally this paper ends with countermeasures of the attack.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"262 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE SoutheastCon 2008","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2008.4494365","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
This paper focuses on the mechanism of Bluetooth authentication. When two units want to communicate in a secure way, they need to be paired to each other. In the pairing process units are exchanging keys and authenticate each other. We have mentioned about bluetooth security breaks and holes used by the attacker. Finally this paper ends with countermeasures of the attack.