A method for improving the Bluetooth key exchange security

Other Title(s)

طريقة لتطوير أمنية تبادل المفاتيح في البلوتوث

Dissertant

Tahsin, Aws Jamal

Thesis advisor

al-Hamami, Ala Husayn

Comitee Members

Muslih, Usamah Kazim
Nassar, Muhammad Uthman

University

Amman Arab University

Faculty

Collage of Computer Sciences and Informatics

Department

Department of Computer Science

University Country

Jordan

Degree

Master

Degree Date

2012

English Abstract

Due to the increased use of Bluetooth in today's short range communications, and driven by the fact that there are too many risks and attacks towards the Bluetooth communication, and since most of the Bluetooth communicating devices uses this technology to exchange personal and business related data, so it is very important to protect this communication and this is the main motivation behind this thesis.

One of the most critical attacks on the Bluetooth communication is the PIN cracking attack, and by definition this attack targets the Personal identification number used by the Bluetooth's pairing protocol to impersonate one or both devices involved in the communication process.

And one of the draw backs of the Bluetooth standard pairing protocol is that the PIN can be cracked in almost no time using a powerful Laptop!.

The goal of this thesis is to introduce a developed pairing protocol which elevates the security level of Bluetooth pairing protocol by eliminating the dependency on the PIN itself for the communication process by modifying the used algorithms and using Diffie-Hellman key exchange algorithm to guarantee a better level of security and to defer many attacks in which those attacks are based on the weak PIN security.

The developed protocol is implemented here within this thesis and the results of the pairing protocol are clearly shown.

The added value of the developed pairing protocol is measured by the increased complexity of the mathematical equations and logical comparison between the available information for the attacker in both scenarios.

The developed protocol allows the backward compatibility with the standard protocol to guarantee the convenience of the users since the developed protocol has the standard protocol imbedded within.

Main Subjects

Telecommunications Engineering

Topics

No. of Pages

62

Table of Contents

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Litriture rivew.

Chapter Three : Proposed solution.

Chapter Four : Implementation and future works.

Chapter Five : Conclusions and future work.

References.

American Psychological Association (APA)

Tahsin, Aws Jamal. (2012). A method for improving the Bluetooth key exchange security. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-526040

Modern Language Association (MLA)

Tahsin, Aws Jamal. A method for improving the Bluetooth key exchange security. (Master's theses Theses and Dissertations Master). Amman Arab University. (2012).
https://search.emarefa.net/detail/BIM-526040

American Medical Association (AMA)

Tahsin, Aws Jamal. (2012). A method for improving the Bluetooth key exchange security. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-526040

Language

English

Data Type

Arab Theses

Record ID

BIM-526040