Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/311491
Title: | Enhancement Of Security In Bluetooth Pairing Schemes |
Researcher: | Gajbhiye, Samta |
Guide(s): | Karmakar, Sanjeev, Sarma, Monisha and Sharma, Sanjay |
Keywords: | Computer Science Computer Science Information Systems Engineering and Technology |
University: | Chhattisgarh Swami Vivekanand Technical University |
Completed Date: | 2019 |
Abstract: | An infrared-based wireless technology Bluetooth is extended to realise Wireless Personal Area Network. Inherent short-range wireless radio transmitter embedded in Bluetooth devices gives up to 24 Mbps data rate and further employs 2.4 GHz bandwidth. The use of Bluetooth technology has turned into a trendy method for short range wireless interconnections for trading data. Therefore, it is imperative to keep up Bluetooth security issues exceptional. It is a demanding assignment for researchers to present an absolute secure Bluetooth device. newlineBefore transmitting the data, the two Bluetooth device form a trusted pair through the methodology called pairing. Up to Bluetooth 2.0 + EDR (Enhanced Data Rate) either the user used to select the Personal Identification Number (PIN) or a fixed PIN was used in the devices that are to be paired. Various Man-In-The-Middle (MITM) attacks on Bluetooth 2.0 forced to improve Bluetooth pairing process. Bluetooth variant 2.1 + EDR include new specification for the pairing method, in particular Secure Simple Pairing (SSP) with Elliptic Curve Diffie-Hellman (ECDH) key exchange algorithm. The aim of SSP is to provide security against passive eavesdropping and MITM attacks. newlineAlthough SSP paid much attention on security issues, several security weaknesses are discovered, including passive off-line guessing attack and active on-line guessing attack. In addition, MITM attack through insecure channel provides a way to access sensitive information during pairing. Therefore, research aims to improve and assess SSP in current version Bluetooth 5.0 through two proposed protocols. First, SSP with Authenticated Public Key Exchange and Delayed Encrypted Capability Exchange (SSP-APKE-DECE) that employs elliptic curve for Diffie-Hellman key exchange algorithm. Second, Classiquantum Resistance Delayed Capability Exchange SSP (CR-DCE-SSP) that utilizes Ring-Learning with Errors (R-LWE) lattice based cryptography. These protocols have been implemented on Ubuntu 14.04 in Numeric Comparison mode, using python |
Pagination: | 16P.,92P. |
URI: | http://hdl.handle.net/10603/311491 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 31.74 kB | Adobe PDF | View/Open |
02_certificates.pdf | 399.13 kB | Adobe PDF | View/Open | |
03_ preliminary pages.pdf | 793.54 kB | Adobe PDF | View/Open | |
04_chapter 1.pdf | 248.68 kB | Adobe PDF | View/Open | |
05_chapter 2.pdf | 291.5 kB | Adobe PDF | View/Open | |
06_chapter 3.pdf | 1.51 MB | Adobe PDF | View/Open | |
07_chapter 4.pdf | 1.67 MB | Adobe PDF | View/Open | |
08_chapter 5.pdf | 1.26 MB | Adobe PDF | View/Open | |
09_chapter 6.pdf | 595.41 kB | Adobe PDF | View/Open | |
10_chapter 7.pdf | 429.71 kB | Adobe PDF | View/Open | |
11_references.pdf | 235.83 kB | Adobe PDF | View/Open | |
12_bibliography.pdf | 526.44 kB | Adobe PDF | View/Open | |
13_annexure.pdf | 10.41 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 225.01 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: