Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/1524
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMutchukota, T R-
dc.contributor.authorPanigrahy, S K-
dc.contributor.authorJena, S K-
dc.date.accessioned2011-08-11T08:47:06Z-
dc.date.available2011-08-11T08:47:06Z-
dc.date.issued2011-
dc.identifier.citationFifth International Conference on Information Processing, 5-7 August 2011, Vol 157, pp 367-376, Bangalore, India.en
dc.identifier.urihttp://dx.doi.org/10.1007/978-3-642-22786-8_46-
dc.identifier.urihttp://hdl.handle.net/2080/1524-
dc.description.abstractThis paper describes the countermeasure of man-in-the-middle attack in Bluetooth secure simple pairing. The attack is based on sending random signals to jam the physical layer of legitimate user and then by falsification of information sent during the input/output capabilities exchange; also the fact that the security of the protocol is likely to be limited by the capabilities of the least powerful or the least secure device type. In addition, a new ountermeasure is devised that render the attack impractical, as well as it is an improvement to the existing Bluetooth secure simple pairing in order to make it more secure.en
dc.format.extent420650 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoen-
dc.publisherSpringeren
dc.subjectBluetooth,en
dc.subjectMITM,en
dc.subjectSSP,en
dc.subjectSecurity,en
dc.subjectNINOen
dc.titleMan-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple Pairingen
dc.typeArticleen
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
MITM-SSP.pdf410.79 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.