USER AUTHENTICATION FOR BLUETOOTH DEVICES

Ab Halim, Azni Haslizan and Tarmizi, Seleviawati (2007) USER AUTHENTICATION FOR BLUETOOTH DEVICES. In: 2nd International Conference on Informatics (Informatics 2007), Hilton Petaling Jaya Hotel, Petaling Jaya, Selangor, Malaysia.

[img] PDF
CSN.pdf

Download (2MB)
Official URL: http://dspace.fsktm.um.edu.my/handle/1812/390

Abstract

There are a number of weaknesses in Bluetooth security architecture that are potential to be exploited. These include Bluetooth security in the area of encryption, authentication and communication. One of Bluetooth weaknesses is it only authenticate device and not user. This paper will focus on Bluetooth security in user authentication to resolve eavesdropping attack. A technique to secure user authentication, namely Secure Socket Layer (SSL) is suggested. Although SSL has been applied in wired environment, it has not been experimented in Bluetooth wireless environment. The objective of this paper is to elaborate the significant of user authentication in Bluetooth technology by applying SSL into Bluetooth security protocol. Moreover, this paper will evaluate how successful SSL in user authentication for Bluetooth technology.

Item Type: Conference or Workshop Item (Paper)
Subjects: Z Bibliography. Library Science. Information Resources > Z665 Library Science. Information Science
Divisions: Faculty of Engineering, Science and Mathematics > School of Electronics and Computer Science
Depositing User: MS SITI NUR ATIKAH MOHAMAD RUSDI
Date Deposited: 15 Jul 2013 07:22
Last Modified: 15 Jul 2013 07:22
URI: http://repository.um.edu.my/id/eprint/320

Actions (login required)

View Item View Item