Securing Bluetooth Communications

Following the increasing confidentiality of data being transferred, many concerns have been raised as to whether Bluetooth transmission is adequately secure. The Bluetooth 2.1 standard introduces a new security mechanism called Secure Simple Pairing (SSP). However, to avoid man-in-the-middle attacks, SSP uses a 6-digit number for authentication. If a human error occurs while conducting visual verification, then data security could be breached. This paper presents an improved protocol to address this problem. This protocol not only secures consumer privacy, but also increases operational efficiency.

[1]  Dirk Fox,et al.  Bluetooth Security , 2002, Datenschutz und Datensicherheit.

[2]  Avishai Wool,et al.  Cracking the Bluetooth PIN , 2005, MobiSys '05.

[3]  Carl Adams,et al.  Short-range wireless technologies with mobile payments systems , 2004, ICEC '04.

[4]  Keijo Haataja,et al.  Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures , 2010, IEEE Transactions on Wireless Communications.

[5]  Jennifer Bray,et al.  Bluetooth application developer's guide : the short range interconnect solution , 2002 .

[6]  Agnieszka Zmijewska,et al.  Evaluating wireless technologies in mobile payments - a customer centric approach , 2005, International Conference on Mobile Business (ICMB'05).

[7]  Alejandro Quintero,et al.  Mobile services access and payment through reusable tickets , 2009, Comput. Commun..

[8]  Elaine Lawrence,et al.  Bluetooth as an enabling technology in mobile transactions , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[9]  V. Lenin,et al.  The United States of America , 2002, Government Statistical Agencies and the Politics of Credibility.

[10]  Karen A. Scarfone,et al.  Guide to Bluetooth Security , 2008 .

[11]  Chun-Ta Li,et al.  A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..

[12]  Ersin Uzun,et al.  Usability Analysis of Secure Pairing Methods , 2007, Financial Cryptography.