Chrome Extension
WeChat Mini Program
Use on ChatGLM

Pairing and Authentication Security Technologies in Low-Power Bluetooth

GREENCOM-ITHINGS-CPSCOM '13 Proceedings of the 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing(2013)

Cited 6|Views2
No score
Abstract
With the release of up-to-date Low-Power (LP) bluetooth 4.0, Bluetooth Technologies are not only widely deployed on personal area devices such as the smart phone, the headset, the intelligent health-care equipment etc., but also are recommended as a standard communication protocol in the Internet of Things. However, due to the inherent limitation in the bluetooth protocol, the network designer must face critical vulnerabilities which might bring serious security issues. This paper describes the security features of the bluetooth 4.0 protocol and analyses pairing and authentication security technology in the LP bluetooth 4.0. The security vulnerabilities and security recommendations concerning to the pairing and authentication process of the bluetooth devices are presented. In the end, the countermeasures are proposed to mitigate the risk.
More
Translated text
Key words
security vulnerability,protocols,serious security issue,bluetooth 4.0,bluetooth device,security recommendation,authentication security technology,information technology security,bluetooth protocol,intelligent health care equipment,analyses pairing,low-power bluetooth,standard communication protocol,personal area devices,communication protocol,pairing security,bluetooth 4.0 protocol,low-power,telecommunication security,smart phones,lp bluetooth,security feature,smart phone,high speed,bluetooth,authentication security technologies,vulnerability,internet of things
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined