Title :
Notice of Violation of IEEE Publication Principles
A new secure scheme purposed for recognition and authentication protocol in Bluetooth environment
Author :
Sadeghzadeh, Seyed Hassan ; Shirazani, Seyed Javad Mirabedini ; Mosleh, M.
Author_Institution :
Fac. of Higher Educ., Islamic Azad Univ., Dezful, Iran
Abstract :
Notice of Violation of IEEE Publication Principles
"A New Secure Scheme Purposed for Recognition and Authentication Protocol in Bluetooth Environment"
by Seyed Hassan Sadeghzadeh, Seyed Javad Mirabedini Shirazani, Mohammad Mosleh
in the Proceedings of the 12th International Conference on Advanced Communication Technology (ICACT 2010), Feb. 2010
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.
This paper contains significant portions of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.
Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:
"Improvement Bluetooth Authentication and Pairing Protocol Using Encrypted Key Exchange and Station to Station MAC Protocols"
by Mostafa Akhavan-E-Saffar, Vahid Tabataba Vakily
in the Proceedings of the 2009 International Conference on Machine Learning and Computing (ICMLC 2009), July 2009, pp. 457-465
Since its creation, Bluetooth has transformed itself from a cable replacement technology to a wireless technology that connects people and machines. Bluetooth has been widely adapted on mobile phones and PDAs. Many other vendors in other industries are integrating Bluetooth into their products. Although vendors are adapting to the technology, Bluetooth hasn\´t been a big hit among users. Security remains a major concern. Poor implementation of the Bluetooth architecture on mobile devices has led to some high profile Bluetooth hacks. Weak security protocol designs expose the Bluetooth system to some devastating protocol attacks. Because some of these devices often contai- n sensitive personal or corporate information, security is always an issue when using Bluetooth with these devices. One issue with wireless technology is that signals might leak to outside of desired boundaries. These leaked signals can be used for various attacks ranging from eavesdropping to injecting traffic to fully impersonating another device. Over the years, several vulnerabilities have been discovered in the Bluetooth protocol design as well as the implementation of Bluetooth technology in applications. In this paper I will begin with briefly describing the Bluetooth protocol, explaining security measures in Bluetooth, and go into detail on specific analyze and discuss the vulnerabilities, and finally present an improvement pairing protocol that works with Encrypted Key Exchange Protocol.
Keywords :
Bluetooth; cryptographic protocols; telecommunication security; Bluetooth architecture; Bluetooth hacks; Bluetooth system; PDA; authentication protocol; cable replacement technology; encrypted key exchange protocol; mobile phones; protocol attacks; recognition protocol; secure scheme; wireless technology; Authentication; Bluetooth; Communication system security; Computer hacking; Information security; Machinery production industries; Mobile handsets; Personal digital assistants; Protocols; Wireless sensor networks; Bluetooth; Mac; SPEKE; station-to-station;
Conference_Titel :
Advanced Communication Technology (ICACT), 2010 The 12th International Conference on
Conference_Location :
Phoenix Park
Print_ISBN :
978-1-4244-5427-3