Dual authentication for bluetooth connection

Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN). This is because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS). These two characteristics have led to r...

Full description

Bibliographic Details
Main Authors: Saliou, Diallo Alhassane, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado
Format: Article
Language:English
Published: IJERA 2014
Subjects:
Online Access:http://irep.iium.edu.my/37547/
http://irep.iium.edu.my/37547/
http://irep.iium.edu.my/37547/1/dual_Authentication_for_bluetooth.pdf
id iium-37547
recordtype eprints
spelling iium-375472018-06-19T04:21:11Z http://irep.iium.edu.my/37547/ Dual authentication for bluetooth connection Saliou, Diallo Alhassane Al-Khateeb, Wajdi Fawzi Mohammed Olanrewaju, Rashidah Funke Fatai, Sado TK Electrical engineering. Electronics Nuclear engineering Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN). This is because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS). These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. Bluetooth technology started with a form of pairing called legacy pairing prior to any communication. However, due to the serious security issues found in the legacy pairing, a secure and simple pairing called SPP was announced with Bluetooth 2.1 and later since 2007. SPP has solved the main security issue which is the weaknesses of the PIN code in the legacy pairing, however it has been found with some vulnerabilities such as eavesdropping and man-in-the-middle (MITM) attacks. Since the discovery of these vulnerabilities, some enhancements have been proposed to the Bluetooth Specification Interest Group (SIG) which is the regulatory body of Bluetooth technology; nevertheless, some proposed enhancements are ineffective or are not yet implemented by Manufacturers. Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. The result was verified on a Graphical User Interface (GUI) built in Microsoft Visual Studio 2010 with C sharp as default environment. It has shown that the proposed scheme works perfectly with the used hardware and software. In addition, the protocol thwarts the passive and active eavesdropping attacks which exist during SSP. These attacks are defeated by avoiding the exchange of passwords and public keys in plain text between the Master and the Slave. Therefore, this protocol is expected to be implemented by the SIG to enhance the security in Bluetooth connection. IJERA 2014-07 Article PeerReviewed application/pdf en http://irep.iium.edu.my/37547/1/dual_Authentication_for_bluetooth.pdf Saliou, Diallo Alhassane and Al-Khateeb, Wajdi Fawzi Mohammed and Olanrewaju, Rashidah Funke and Fatai, Sado (2014) Dual authentication for bluetooth connection. International Journal of Engineering Research and Application, 4 (7). pp. 181-191. ISSN 2248-9622 http://www.ijera.com/papers/Vol4_issue7/Version%203/AD04703181191.pdf
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic TK Electrical engineering. Electronics Nuclear engineering
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
Saliou, Diallo Alhassane
Al-Khateeb, Wajdi Fawzi Mohammed
Olanrewaju, Rashidah Funke
Fatai, Sado
Dual authentication for bluetooth connection
description Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN). This is because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS). These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. Bluetooth technology started with a form of pairing called legacy pairing prior to any communication. However, due to the serious security issues found in the legacy pairing, a secure and simple pairing called SPP was announced with Bluetooth 2.1 and later since 2007. SPP has solved the main security issue which is the weaknesses of the PIN code in the legacy pairing, however it has been found with some vulnerabilities such as eavesdropping and man-in-the-middle (MITM) attacks. Since the discovery of these vulnerabilities, some enhancements have been proposed to the Bluetooth Specification Interest Group (SIG) which is the regulatory body of Bluetooth technology; nevertheless, some proposed enhancements are ineffective or are not yet implemented by Manufacturers. Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. The result was verified on a Graphical User Interface (GUI) built in Microsoft Visual Studio 2010 with C sharp as default environment. It has shown that the proposed scheme works perfectly with the used hardware and software. In addition, the protocol thwarts the passive and active eavesdropping attacks which exist during SSP. These attacks are defeated by avoiding the exchange of passwords and public keys in plain text between the Master and the Slave. Therefore, this protocol is expected to be implemented by the SIG to enhance the security in Bluetooth connection.
format Article
author Saliou, Diallo Alhassane
Al-Khateeb, Wajdi Fawzi Mohammed
Olanrewaju, Rashidah Funke
Fatai, Sado
author_facet Saliou, Diallo Alhassane
Al-Khateeb, Wajdi Fawzi Mohammed
Olanrewaju, Rashidah Funke
Fatai, Sado
author_sort Saliou, Diallo Alhassane
title Dual authentication for bluetooth connection
title_short Dual authentication for bluetooth connection
title_full Dual authentication for bluetooth connection
title_fullStr Dual authentication for bluetooth connection
title_full_unstemmed Dual authentication for bluetooth connection
title_sort dual authentication for bluetooth connection
publisher IJERA
publishDate 2014
url http://irep.iium.edu.my/37547/
http://irep.iium.edu.my/37547/
http://irep.iium.edu.my/37547/1/dual_Authentication_for_bluetooth.pdf
first_indexed 2023-09-18T20:53:52Z
last_indexed 2023-09-18T20:53:52Z
_version_ 1777410174091264000