2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2016
DOI: 10.1109/icacci.2016.7732294
|View full text |Cite
|
Sign up to set email alerts
|

Design, implementation and security analysis of Bluetooth pairing protocol in NS2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Albahar et al [19][20][21] presented some countermeasures for SSP to prevent MITM attacks such as using new precautionary steps in the just works association model and building the virtual channel. Gajbhiye et al [22] presented the simulation and the security analysis of the numeric comparison association model in the network simulator NS2.…”
Section: Previous Work On Secure Simple Pairingmentioning
confidence: 99%
“…Albahar et al [19][20][21] presented some countermeasures for SSP to prevent MITM attacks such as using new precautionary steps in the just works association model and building the virtual channel. Gajbhiye et al [22] presented the simulation and the security analysis of the numeric comparison association model in the network simulator NS2.…”
Section: Previous Work On Secure Simple Pairingmentioning
confidence: 99%
“…Typical device pairing protocols perform a Diffie-Hellman (DH) or an Elliptic Curve Diffie-Hellman (ECDH) key exchange over the in-band wireless channel and then use a human-assisted out-of-band (OOB) channel to thwart potential impersonation and man-in-themiddle attackers in the in-band channel. Several researchers have studied the security and usability of device pairing protocols in significant detail [22,26,30,42]. The existing literature assumes a powerful Dolev-Yao type attacker on the in-band wireless channel and an OOB channel that provides some inherent protection for the confidentiality and/or integrity of the data exchanged over it.…”
Section: Device Pairing and Relay Attackmentioning
confidence: 99%
“…In this section, we analyze the security properties and the efficiency of the NC protocol and the OOB protocol in Bluetooth standard v5.0 by contrast to three related SSP protocols [ 12 , 13 , 23 ].…”
Section: Comparison Analysis Of Related Protocolsmentioning
confidence: 99%
“…The improved NC protocol proposed by Yeh et al [ 23 ] uses PIN number instead of confirming the displayed numbers to prevent MITM attacks. The improved NC protocol proposed by Gajbhiye et al [ 12 ] uses the signature mechanism to confirm the pairing devices. The SSP protocol with delayed-encrypted IO (SSP-DEIO) proposed by Gajbhiye et al [ 13 ] delays the exchange of encrypted IO capability until Phase 2 to overcome from the problem of capturing the IO capability of the pairing devices.…”
Section: Comparison Analysis Of Related Protocolsmentioning
confidence: 99%
See 1 more Smart Citation