A method for improving the Bluetooth key exchange security
Other Title(s)
طريقة لتطوير أمنية تبادل المفاتيح في البلوتوث
Dissertant
Thesis advisor
Comitee Members
Muslih, Usamah Kazim
Nassar, Muhammad Uthman
University
Amman Arab University
Faculty
Collage of Computer Sciences and Informatics
Department
Department of Computer Science
University Country
Jordan
Degree
Master
Degree Date
2012
English Abstract
Due to the increased use of Bluetooth in today's short range communications, and driven by the fact that there are too many risks and attacks towards the Bluetooth communication, and since most of the Bluetooth communicating devices uses this technology to exchange personal and business related data, so it is very important to protect this communication and this is the main motivation behind this thesis.
One of the most critical attacks on the Bluetooth communication is the PIN cracking attack, and by definition this attack targets the Personal identification number used by the Bluetooth's pairing protocol to impersonate one or both devices involved in the communication process.
And one of the draw backs of the Bluetooth standard pairing protocol is that the PIN can be cracked in almost no time using a powerful Laptop!.
The goal of this thesis is to introduce a developed pairing protocol which elevates the security level of Bluetooth pairing protocol by eliminating the dependency on the PIN itself for the communication process by modifying the used algorithms and using Diffie-Hellman key exchange algorithm to guarantee a better level of security and to defer many attacks in which those attacks are based on the weak PIN security.
The developed protocol is implemented here within this thesis and the results of the pairing protocol are clearly shown.
The added value of the developed pairing protocol is measured by the increased complexity of the mathematical equations and logical comparison between the available information for the attacker in both scenarios.
The developed protocol allows the backward compatibility with the standard protocol to guarantee the convenience of the users since the developed protocol has the standard protocol imbedded within.
Main Subjects
Telecommunications Engineering
Topics
No. of Pages
62
Table of Contents
Table of contents.
Abstract.
Abstract in Arabic.
Chapter One : Introduction.
Chapter Two : Litriture rivew.
Chapter Three : Proposed solution.
Chapter Four : Implementation and future works.
Chapter Five : Conclusions and future work.
References.
American Psychological Association (APA)
Tahsin, Aws Jamal. (2012). A method for improving the Bluetooth key exchange security. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-526040
Modern Language Association (MLA)
Tahsin, Aws Jamal. A method for improving the Bluetooth key exchange security. (Master's theses Theses and Dissertations Master). Amman Arab University. (2012).
https://search.emarefa.net/detail/BIM-526040
American Medical Association (AMA)
Tahsin, Aws Jamal. (2012). A method for improving the Bluetooth key exchange security. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-526040
Language
English
Data Type
Arab Theses
Record ID
BIM-526040