Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm

Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN). This is because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS). These two characteristics have led...

Full description

Bibliographic Details
Main Authors: Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado
Format: Conference or Workshop Item
Language:English
English
Published: 2014
Subjects:
Online Access:http://irep.iium.edu.my/39193/
http://irep.iium.edu.my/39193/1/1067.pdf
http://irep.iium.edu.my/39193/4/5th_international_conference_%28ICCCE_2014%29.pdf