Abstract | ||
---|---|---|
The Bluetooth standard has a provision for mutual authentication of connecting devices but not their actual users and allows access control during connection setup only. We propose a user authorization and pairing (UAP) application, that has the ability to perform authentication and authorization of users using role based model. The pairing procedure, which exchanges link key between devices, is also performed as a part of the user authorization process. The integrity of the message is guaranteed by using message authentication codes. We also extend an attack on a short PIN during the pairing procedure for devices compliant with the Bluetooth specification version 1.1. |
Year | DOI | Venue |
---|---|---|
2002 | 10.1109/ICON.2002.1033349 | ICON |
Keywords | Field | DocType |
bluetooth,access protocols,authorisation,cryptography,data integrity,message authentication,telecommunication security,bluetooth specification version 1.1,bluetooth standard,mac protocol,access control,encryption algorithm,link key exchange,message authentication codes,notebook computers,personal area network,role based model,secure authorization,short pin attack,user authentication,user authorization and pairing,security,authentication,authorization,teeth,wireless communication,message authentication code | Computer access control,Mutual authentication,Personal area network,Authentication,Message authentication code,Computer science,Computer network,Encryption,Access control,Bluetooth | Conference |
ISBN | Citations | PageRank |
0-7803-7533-5 | 1 | 0.52 |
References | Authors | |
4 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
L. H. Nguyen | 1 | 88 | 6.05 |
R. Safavi-Naini | 2 | 173 | 17.60 |
Willy Susilo | 3 | 4823 | 353.18 |
Tadeusz A. Wysocki | 4 | 142 | 67.11 |