DocumentCode
579932
Title
Contention for Man-in-the-Middle Attacks in Bluetooth Networks
Author
Sandhya, S. ; Devi, K.A.S.
Author_Institution
Dept. of MCA, R V Coll. of Eng., Bangalore, India
fYear
2012
fDate
3-5 Nov. 2012
Firstpage
700
Lastpage
703
Abstract
The adoption rate of Bluetooth technology has been very fast. It is estimated that there will be around 1 billion users who will be using some Bluetooth devices one way or the other. The fast adoption rate has made the manufacturers and users to work on delivering products based on the latest version of Bluetooth which is v4.0. One of the major attacks on Bluetooth is the Man in the middle attack. This paper reviews the existing literature on various man in the middle attacks. The existing counter measures for thwarting the man in the middle attack are also discussed. We propose an additional counter measure that will help in countering the attack and making the communication more secure.
Keywords
Bluetooth; computer network security; Bluetooth devices; Bluetooth networks; Bluetooth technology; man-in-the-middle attacks; Authentication; Bluetooth; Numerical models; Usability; Wireless communication; Just Works; Man in the middle; Numeric Comparison; Out of Band; Pass key;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on
Conference_Location
Mathura
Print_ISBN
978-1-4673-2981-1
Type
conf
DOI
10.1109/CICN.2012.72
Filename
6375203
Link To Document