DSpace@nitr >
National Institue of Technology- Rourkela >
Conference Papers >

Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/1527

Full metadata record

DC FieldValueLanguage
contributor.authorMuchukota, T R-
contributor.authorPanigrahy, S K-
contributor.authorJena, S K-
date.accessioned2011-08-16T09:01:02Z-
date.available2011-08-16T09:01:02Z-
date.issued2011-08-
identifier.citationProceedings of the Fifth International Conference on Information Processing, 5-7 August 2011, Bangalore, India, PP. 367-376en
identifier.urihttp://www.springerlink.com/content/n676334840q68236/-
identifier.urihttp://dx.doi.org/10.1007/978-3-642-22786-8_46-
identifier.urihttp://hdl.handle.net/2080/1527-
descriptionCopyright belongs to the Proceedings Publisher- Springeren
description.abstractThis paper describes the countermeasure of man-in-the-middle attack in Bluetooth secure simple pairing. The attack is based on sending random signals to jam the physical layer of legitimate user and then by falsification of information sent during the input/output capabilities exchange; also the fact that the security of the protocol is likely to be limited by the capabilities of the least powerful or the least secure device type. In addition, a new countermeasure is devised that render the attack impractical, as well as it is an improvement to the existing Bluetooth secure simple pairing in order to make it more secure.en
format.extent221683 bytes-
format.mimetypeapplication/pdf-
language.isoen-
publisherSpringeren
relation.ispartofseriesCCIS;Vol 157-
subjectBluetoothen
subjectMITMen
subjectSSPen
subjectSecurityen
subjectNINOen
titleMan-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple Pairingen
typeArticleen
typeBook chapteren
Appears in Collections:Conference Papers

Files in This Item:

File Description SizeFormat
MITM-SSP.pdf216KbAdobe PDFView/Open

Show simple item record

All items in DSpace are protected by copyright, with all rights reserved.

 

Powered by DSpace Feedback