Title :
Contention for Man-in-the-Middle Attacks in Bluetooth Networks
Author :
Sandhya, S. ; Devi, K.A.S.
Author_Institution :
Dept. of MCA, R V Coll. of Eng., Bangalore, India
Abstract :
The adoption rate of Bluetooth technology has been very fast. It is estimated that there will be around 1 billion users who will be using some Bluetooth devices one way or the other. The fast adoption rate has made the manufacturers and users to work on delivering products based on the latest version of Bluetooth which is v4.0. One of the major attacks on Bluetooth is the Man in the middle attack. This paper reviews the existing literature on various man in the middle attacks. The existing counter measures for thwarting the man in the middle attack are also discussed. We propose an additional counter measure that will help in countering the attack and making the communication more secure.
Keywords :
Bluetooth; computer network security; Bluetooth devices; Bluetooth networks; Bluetooth technology; man-in-the-middle attacks; Authentication; Bluetooth; Numerical models; Usability; Wireless communication; Just Works; Man in the middle; Numeric Comparison; Out of Band; Pass key;
Conference_Titel :
Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on
Conference_Location :
Mathura
Print_ISBN :
978-1-4673-2981-1
DOI :
10.1109/CICN.2012.72