{"title":"重新计算密钥-解决窃听攻击","authors":"P. Suri, S. Rani","doi":"10.1109/SECON.2008.4494364","DOIUrl":null,"url":null,"abstract":"In this paper we have given the problem of bluetooth fixed address. It is a unique number used to identify a bluetooth device. The bluetooth device address is also used in authentication and in generation of frequency hop sequences. We have given the role of using bluetooth address in the authentication process. We have given the proposed solution for improving the concept of using bluetooth fixed address in the process of authentication.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Recalculation of keys -Solution to the eavesdrop attack\",\"authors\":\"P. Suri, S. Rani\",\"doi\":\"10.1109/SECON.2008.4494364\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we have given the problem of bluetooth fixed address. It is a unique number used to identify a bluetooth device. The bluetooth device address is also used in authentication and in generation of frequency hop sequences. We have given the role of using bluetooth address in the authentication process. We have given the proposed solution for improving the concept of using bluetooth fixed address in the process of authentication.\",\"PeriodicalId\":188817,\"journal\":{\"name\":\"IEEE SoutheastCon 2008\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE SoutheastCon 2008\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECON.2008.4494364\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE SoutheastCon 2008","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2008.4494364","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Recalculation of keys -Solution to the eavesdrop attack
In this paper we have given the problem of bluetooth fixed address. It is a unique number used to identify a bluetooth device. The bluetooth device address is also used in authentication and in generation of frequency hop sequences. We have given the role of using bluetooth address in the authentication process. We have given the proposed solution for improving the concept of using bluetooth fixed address in the process of authentication.