• DocumentCode
    514402
  • Title

    Notice of Violation of IEEE Publication Principles
    A new secure scheme purposed for recognition and authentication protocol in Bluetooth environment

  • Author

    Sadeghzadeh, Seyed Hassan ; Shirazani, Seyed Javad Mirabedini ; Mosleh, M.

  • Author_Institution
    Fac. of Higher Educ., Islamic Azad Univ., Dezful, Iran
  • Volume
    2
  • fYear
    2010
  • fDate
    7-10 Feb. 2010
  • Firstpage
    1326
  • Lastpage
    1331
  • Abstract
    Notice of Violation of IEEE Publication Principles

    "A New Secure Scheme Purposed for Recognition and Authentication Protocol in Bluetooth Environment"
    by Seyed Hassan Sadeghzadeh, Seyed Javad Mirabedini Shirazani, Mohammad Mosleh
    in the Proceedings of the 12th International Conference on Advanced Communication Technology (ICACT 2010), Feb. 2010

    After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.

    This paper contains significant portions of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.

    Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:

    "Improvement Bluetooth Authentication and Pairing Protocol Using Encrypted Key Exchange and Station to Station MAC Protocols"
    by Mostafa Akhavan-E-Saffar, Vahid Tabataba Vakily
    in the Proceedings of the 2009 International Conference on Machine Learning and Computing (ICMLC 2009), July 2009, pp. 457-465

    Since its creation, Bluetooth has transformed itself from a cable replacement technology to a wireless technology that connects people and machines. Bluetooth has been widely adapted on mobile phones and PDAs. Many other vendors in other industries are integrating Bluetooth into their products. Although vendors are adapting to the technology, Bluetooth hasn\´t been a big hit among users. Security remains a major concern. Poor implementation of the Bluetooth architecture on mobile devices has led to some high profile Bluetooth hacks. Weak security protocol designs expose the Bluetooth system to some devastating protocol attacks. Because some of these devices often contai- n sensitive personal or corporate information, security is always an issue when using Bluetooth with these devices. One issue with wireless technology is that signals might leak to outside of desired boundaries. These leaked signals can be used for various attacks ranging from eavesdropping to injecting traffic to fully impersonating another device. Over the years, several vulnerabilities have been discovered in the Bluetooth protocol design as well as the implementation of Bluetooth technology in applications. In this paper I will begin with briefly describing the Bluetooth protocol, explaining security measures in Bluetooth, and go into detail on specific analyze and discuss the vulnerabilities, and finally present an improvement pairing protocol that works with Encrypted Key Exchange Protocol.
  • Keywords
    Bluetooth; cryptographic protocols; telecommunication security; Bluetooth architecture; Bluetooth hacks; Bluetooth system; PDA; authentication protocol; cable replacement technology; encrypted key exchange protocol; mobile phones; protocol attacks; recognition protocol; secure scheme; wireless technology; Authentication; Bluetooth; Communication system security; Computer hacking; Information security; Machinery production industries; Mobile handsets; Personal digital assistants; Protocols; Wireless sensor networks; Bluetooth; Mac; SPEKE; station-to-station;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Communication Technology (ICACT), 2010 The 12th International Conference on
  • Conference_Location
    Phoenix Park
  • ISSN
    1738-9445
  • Print_ISBN
    978-1-4244-5427-3
  • Type

    conf

  • Filename
    5440278