A Bypassing Security ModelforAnonymous Bluetooth Peers

Bluetooth technology provides conveniences ranging fromsimply substituting forwires ofelectrical household prod- uctstoconstructing homenetwork systems. Providing Bluetooth- technology-based services inpublic raises security issues in providing asecure Bluetooth linkforunknownBluetooth peers. Inthispaper, we present a bypassing security modelfor protecting communications between anonymous Bluetooth peers viawireless local areanetwork(WLAN)andauthentication authorization andaccounting (AAA)technologies. Ourbypassing security modeliscomposed oftheBluetooth peerauthentication, theBluetooth keynegotiation, andthelinkkeygeneration. It brings acost-effective realization inconjunction withstandard technologies andissuitable forlarge-scale service providing systems by relying on theinfrastructure network. Incon- trast toacertificate-based Diffie-Hellman methodthatrequires computation-intensive cryptographic functions, ourmodelper- formsfaster onpower-limited devices.

[1]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[2]  Jaap-Henk Hoepman The Ephemeral Pairing Problem , 2004, Financial Cryptography.

[3]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[4]  Victor Fajardo,et al.  Diameter Base Protocol , 2003, RFC.