Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Open Access Theses & Dissertations

2009

BLUETOOTH AUTHENTICATION

Articles 1 - 1 of 1

Full-Text Articles in Engineering

An Enhanced Method For The Existing Bluetooth Pairing Protocol To Avoid Impersonation Attacks, Patricia Aidee Mendoza Jan 2009

An Enhanced Method For The Existing Bluetooth Pairing Protocol To Avoid Impersonation Attacks, Patricia Aidee Mendoza

Open Access Theses & Dissertations

As the use of the Bluetooth technology in wireless technologies such as computers, cell phones, personal digital assistants (PDAs), printers, digital cameras, PC peripherals, and headphones, among others, has enormously increased during this decade, it has also increased the need of employing a more secure and robust pairing protocol that protects the transfer of information between Bluetooth devices.

The existing Bluetooth pairing protocol starts when a Bluetooth device is set to be in discoverable mode and it is found by another device. After this step is completed, it initiates the pairing procedure by sharing some important device information, then by …