A method for improving the Bluetooth key exchange security

العناوين الأخرى

طريقة لتطوير أمنية تبادل المفاتيح في البلوتوث

مقدم أطروحة جامعية

Tahsin, Aws Jamal

مشرف أطروحة جامعية

al-Hamami, Ala Husayn

أعضاء اللجنة

Muslih, Usamah Kazim
Nassar, Muhammad Uthman

الجامعة

جامعة عمان العربية

الكلية

كلية العلوم الحاسوبية و المعلوماتية

القسم الأكاديمي

قسم علم الحاسوب

دولة الجامعة

الأردن

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2012

الملخص الإنجليزي

Due to the increased use of Bluetooth in today's short range communications, and driven by the fact that there are too many risks and attacks towards the Bluetooth communication, and since most of the Bluetooth communicating devices uses this technology to exchange personal and business related data, so it is very important to protect this communication and this is the main motivation behind this thesis.

One of the most critical attacks on the Bluetooth communication is the PIN cracking attack, and by definition this attack targets the Personal identification number used by the Bluetooth's pairing protocol to impersonate one or both devices involved in the communication process.

And one of the draw backs of the Bluetooth standard pairing protocol is that the PIN can be cracked in almost no time using a powerful Laptop!.

The goal of this thesis is to introduce a developed pairing protocol which elevates the security level of Bluetooth pairing protocol by eliminating the dependency on the PIN itself for the communication process by modifying the used algorithms and using Diffie-Hellman key exchange algorithm to guarantee a better level of security and to defer many attacks in which those attacks are based on the weak PIN security.

The developed protocol is implemented here within this thesis and the results of the pairing protocol are clearly shown.

The added value of the developed pairing protocol is measured by the increased complexity of the mathematical equations and logical comparison between the available information for the attacker in both scenarios.

The developed protocol allows the backward compatibility with the standard protocol to guarantee the convenience of the users since the developed protocol has the standard protocol imbedded within.

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الموضوعات

عدد الصفحات

62

قائمة المحتويات

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Litriture rivew.

Chapter Three : Proposed solution.

Chapter Four : Implementation and future works.

Chapter Five : Conclusions and future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Tahsin, Aws Jamal. (2012). A method for improving the Bluetooth key exchange security. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-526040

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Tahsin, Aws Jamal. A method for improving the Bluetooth key exchange security. (Master's theses Theses and Dissertations Master). Amman Arab University. (2012).
https://search.emarefa.net/detail/BIM-526040

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Tahsin, Aws Jamal. (2012). A method for improving the Bluetooth key exchange security. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-526040

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-526040