Features of the implementation of the simple pairing algorithm Bluetooth devices

Main Article Content

A.A. Voloshin
B.B. Pratsyuk
Yu.V. Prokopenko

Abstract

The paper presents Secure Simple Pairing algorithm for Bluetooth-enabled devices, which provides easier and safer pass of authentication and encryption key generation stages. The algorithm was implemented in TC-3000 platform and can be used in Bluetooth devices with different input/output (IO) capabilities such as presence/ absence of the display, presence/absence of the text or numbers entering possibility, etc

Article Details

How to Cite
Voloshin, A. ., Pratsyuk, B. ., & Prokopenko, Y. . (2010). Features of the implementation of the simple pairing algorithm Bluetooth devices. Electronics and Communications, 15(4), 192–197. https://doi.org/10.20535/2312-1807.2010.15.4.301781
Section
Systems of telecommunication, communication and information protection

References

R. Bouhenguel, I. Mahgoub, and M. Ilyas, “Bluetooth Security in Wearable Computing Applications”, in 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies, Penang, Malaysia, 2008, pp. 182–186. DOI:10.1109/HONET.2008.4810232

D. Sharmila, R. Neelaveni, and K. Kiruba, “Notice of Violation of IEEE Publication Principles: Bluetooth Man-In-The-Middle attack based on Secure Simple Pairing using Out Of Band association model”, in 2009 International Conference on Control, Automation, Communication and Energy Conservation, 2009, pp. 1–6.

www.intuit.ru/department/security/networksec/11/

Specification of the Bluetooth System, v.2.1, SIG, 2007, 1400

L. Babenko and A. Kurilkina, Algorithms “distributed agreements” to assess the computational strength of cryptoagglorythms, Moscow: DMK Press, 2008, p. 112.

http://tools.ietf.org/html/rfc2104

C. Bisdikian, “An overview of the Bluetooth wireless technology”, IEEE Communications Magazine, vol. 39, no. 12, pp. 86–94, Dec. 2001 DOI:10.1109/35.968817

www.openssl.org