Features of the implementation of the simple pairing algorithm Bluetooth devices
Main Article Content
Abstract
The paper presents Secure Simple Pairing algorithm for Bluetooth-enabled devices, which provides easier and safer pass of authentication and encryption key generation stages. The algorithm was implemented in TC-3000 platform and can be used in Bluetooth devices with different input/output (IO) capabilities such as presence/ absence of the display, presence/absence of the text or numbers entering possibility, etc
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
References
R. Bouhenguel, I. Mahgoub, and M. Ilyas, “Bluetooth Security in Wearable Computing Applications”, in 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies, Penang, Malaysia, 2008, pp. 182–186. DOI:10.1109/HONET.2008.4810232
D. Sharmila, R. Neelaveni, and K. Kiruba, “Notice of Violation of IEEE Publication Principles: Bluetooth Man-In-The-Middle attack based on Secure Simple Pairing using Out Of Band association model”, in 2009 International Conference on Control, Automation, Communication and Energy Conservation, 2009, pp. 1–6.
www.intuit.ru/department/security/networksec/11/
Specification of the Bluetooth System, v.2.1, SIG, 2007, 1400
L. Babenko and A. Kurilkina, Algorithms “distributed agreements” to assess the computational strength of cryptoagglorythms, Moscow: DMK Press, 2008, p. 112.
http://tools.ietf.org/html/rfc2104
C. Bisdikian, “An overview of the Bluetooth wireless technology”, IEEE Communications Magazine, vol. 39, no. 12, pp. 86–94, Dec. 2001 DOI:10.1109/35.968817
www.openssl.org