A Bypassing Security ModelforAnonymous Bluetooth Peers
暂无分享,去创建一个
Bluetooth technology provides conveniences ranging fromsimply substituting forwires ofelectrical household prod- uctstoconstructing homenetwork systems. Providing Bluetooth- technology-based services inpublic raises security issues in providing asecure Bluetooth linkforunknownBluetooth peers. Inthispaper, we present a bypassing security modelfor protecting communications between anonymous Bluetooth peers viawireless local areanetwork(WLAN)andauthentication authorization andaccounting (AAA)technologies. Ourbypassing security modeliscomposed oftheBluetooth peerauthentication, theBluetooth keynegotiation, andthelinkkeygeneration. It brings acost-effective realization inconjunction withstandard technologies andissuitable forlarge-scale service providing systems by relying on theinfrastructure network. Incon- trast toacertificate-based Diffie-Hellman methodthatrequires computation-intensive cryptographic functions, ourmodelper- formsfaster onpower-limited devices.
[1] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[2] Jaap-Henk Hoepman. The Ephemeral Pairing Problem , 2004, Financial Cryptography.
[3] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[4] Victor Fajardo,et al. Diameter Base Protocol , 2003, RFC.