A secure authentication scheme for bluetooth connection
Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN) because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS).
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
2014
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/43065/ http://irep.iium.edu.my/43065/2/A_Secure_Authentication_Scheme_for_Bluetooth_Connection.pdf http://irep.iium.edu.my/43065/7/43065_A%20secure%20authentication%20scheme%20for%20bluetooth_Scopus.pdf |
Summary: | Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN) because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS). |
---|