Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/1527
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMuchukota, T R-
dc.contributor.authorPanigrahy, S K-
dc.contributor.authorJena, S K-
dc.date.accessioned2011-08-16T09:01:02Z-
dc.date.available2011-08-16T09:01:02Z-
dc.date.issued2011-08-
dc.identifier.citationProceedings of the Fifth International Conference on Information Processing, 5-7 August 2011, Bangalore, India, PP. 367-376en
dc.identifier.urihttp://www.springerlink.com/content/n676334840q68236/-
dc.identifier.urihttp://dx.doi.org/10.1007/978-3-642-22786-8_46-
dc.identifier.urihttp://hdl.handle.net/2080/1527-
dc.descriptionCopyright belongs to the Proceedings Publisher- Springeren
dc.description.abstractThis paper describes the countermeasure of man-in-the-middle attack in Bluetooth secure simple pairing. The attack is based on sending random signals to jam the physical layer of legitimate user and then by falsification of information sent during the input/output capabilities exchange; also the fact that the security of the protocol is likely to be limited by the capabilities of the least powerful or the least secure device type. In addition, a new countermeasure is devised that render the attack impractical, as well as it is an improvement to the existing Bluetooth secure simple pairing in order to make it more secure.en
dc.format.extent221683 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoen-
dc.publisherSpringeren
dc.relation.ispartofseriesCCIS;Vol 157-
dc.subjectBluetoothen
dc.subjectMITMen
dc.subjectSSPen
dc.subjectSecurityen
dc.subjectNINOen
dc.titleMan-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple Pairingen
dc.typeArticleen
dc.typeBook chapteren
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
MITM-SSP.pdf216.49 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.