• DocumentCode
    579932
  • Title

    Contention for Man-in-the-Middle Attacks in Bluetooth Networks

  • Author

    Sandhya, S. ; Devi, K.A.S.

  • Author_Institution
    Dept. of MCA, R V Coll. of Eng., Bangalore, India
  • fYear
    2012
  • fDate
    3-5 Nov. 2012
  • Firstpage
    700
  • Lastpage
    703
  • Abstract
    The adoption rate of Bluetooth technology has been very fast. It is estimated that there will be around 1 billion users who will be using some Bluetooth devices one way or the other. The fast adoption rate has made the manufacturers and users to work on delivering products based on the latest version of Bluetooth which is v4.0. One of the major attacks on Bluetooth is the Man in the middle attack. This paper reviews the existing literature on various man in the middle attacks. The existing counter measures for thwarting the man in the middle attack are also discussed. We propose an additional counter measure that will help in countering the attack and making the communication more secure.
  • Keywords
    Bluetooth; computer network security; Bluetooth devices; Bluetooth networks; Bluetooth technology; man-in-the-middle attacks; Authentication; Bluetooth; Numerical models; Usability; Wireless communication; Just Works; Man in the middle; Numeric Comparison; Out of Band; Pass key;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on
  • Conference_Location
    Mathura
  • Print_ISBN
    978-1-4673-2981-1
  • Type

    conf

  • DOI
    10.1109/CICN.2012.72
  • Filename
    6375203