Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN). This is because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS). These two characteristics have led...
Main Authors: | Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
2014
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/39193/ http://irep.iium.edu.my/39193/1/1067.pdf http://irep.iium.edu.my/39193/4/5th_international_conference_%28ICCCE_2014%29.pdf |
Similar Items
-
Dual authentication for bluetooth connection
by: Saliou, Diallo Alhassane, et al.
Published: (2014) -
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014) -
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010) -
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010) -
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)