Revisiting Bluetooth Security (Short Paper)

  • Authors:
  • Manik Lal Das;Ravi Mukkamala

  • Affiliations:
  • Dhirubhai Ambani Institute of Information and Communication Technology, Gandhinagar, India 382007;Department of Computer Science, Old Dominion University, Norfolk, USA VA 23529

  • Venue:
  • ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Bluetooth technology is gaining increasing interest in the research community because of the convenience of exchanging information between wireless devices. As the communication medium is wireless, security is an important concern in this emerging technology. This paper discusses the basic security of Bluetooth technology, some of its shortcomings and presents two new proposals for securing Bluetooth technology. One of the proposals is based on passkey-authenticated key exchange, where security relies on keyed hash function, and the other one is on amplified passkey-authenticated key exchange, where security relies on elliptic curve discrete logarithms problem. The latter provides some additional security services, but with added cost compared to the former one. Both protocols provide mutual authentication, resist known and possible threats, and achieve efficiency compared to other protocols.