Hardware Implementation of Bluetooth Security
IEEE Pervasive Computing
A Different Look at Secure Distributed Computation
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Bluetooth™ 1.1: connect without cables, second edition
Bluetooth™ 1.1: connect without cables, second edition
Hi-index | 0.00 |
We present a new Bluetooth authentication model using some game theory concepts. Bluetooth is a wireless communication protocol designed for WPAN (Wireless Personal Area Nework) use. Game theory is a branch of mathematics and logic which deals with the analysis of games. An authentication between two Bluetooth devices is an unidirectional challenge-response procedure and consequently, have many vulnerabilities. We propose a bidirectional authentication scheme. We consider the authentication as a noncooperative non-zero-sum bimatrix game. We define three strategies for each player and we compute the best-response strategies (also called Nash equilibria) for our game. Using Simplex algorithm, we find only one Nash equilibrium corresponding to the case where both Bluetooth devices are authentic and trying to securily communicate together. In a Nash equilibrium no player has an incentive to deviate from such situation.