Total views : 175

A Strenous Macroanalysis on the Substratals of Securing Bluetooth Mobile Workforce Devices

Affiliations

  • VIT University, Chennai - 632014, Tamil Nadu, India
  • Jawaharlal College of Engineering and Technology, Ottapalam - 679301, Kerala, India
  • Sasurie College of Engineering, Vijayamangalam - 638056, Tamil Nadu, India

Abstract


Objectives: Bluetooth is extending to the blooming Internet of Things (IoT). This article provides an extensive literature survey on the security mechanisms; operational range of Bluetooth. Statistical Analysis: The user can achieve 3 Mbps data rate across an operational range of 100 meters. Bluetooth is a pretty impressive technology that connects and controls all the devices over a distance by using an IoT enabled APP due to which is there is a high possibility of Bluetooth charging for its services like the Internet Service Provider (ISP). Bluetooth 4.0 features reliable pairing and encryption whereas the earlier versions had less importance on security. Findings: In spite of the inherent security in Bluetooth, insidious security issues remain around Bluetooth transfer. Most of the problems were identified and rectified but still as the usage and technology improves, undiscovered problems bloom. There is no software in Bluetooth that has zero security vulnerabilities. Security threats can be overcome by generating a random key. This key is generated in random by combining the significant features of the device along with the customized features of the person. Improvements: Security can be upgraded by improving the strength of Authentication; Encryption algorithm; Augmenting Range of Bluetooth by making it IoT Enabled.

Keywords

Authentication, Encryption, Interoperable, Internet-of-Things, Range.

Full Text:

 |  (PDF views: 166)

References


  • Haataja K, Hypponen K, Pasanen S, Toivanen P. Bluetooth security attacks: Comaparitive analysis, attacks and counter measures. Springer Briefs in Computer Science. Heidelberg: Springer; 2013.
  • Haataja K. Security threats and counter measures in bluetoothenabled systems. Kuopio University Library; 2009. p.68–80.
  • Minar NB-N, Tarique M. Bluetooth security threats and solutions: A Survey. IJDPS. 2012; 3(1):127–48.
  • Mana M, Feham M, Bensaber BA. A light weight protocol to provide location privacy in wireless body area networks.IJNSA. 2011; 3(2):1–11.
  • Malkani YA, Dhomeja LD. PSim: A tool for analysis of device pairing methods. IJNSA. 2009; 1(3):39–49.
  • Kumar. A comparative study of secure device pairing methods. IEEE International Conference on Pervasive Computing and Communications, (PerCom-09); 2009. p.1–10.
  • Mayrhofer R, Fuss J, Ion I. UACAP: A Unified Auxiliary Channel Authentication Protocol. Transactions on Mobile Computing. 2012; 1(1):710–21.
  • Mayrhofer R, Gellersen H. Shake well before use: Authentication based on accelerometer data. 5th International Conference on Proceedings of Pervasive Computing, ser. LNCS; 2007. p. 144–61.
  • Soriente C, Tsudik G, Uzun E. BEDA: Button-enabled device pairing. Proceedings of IWSSI; 2007. p. 443–9.
  • Available from: https://developer.bluetooth.org/ TechnologyOverview/Pages/LE-Security.aspx
  • Bluetooth Specification Version 4.2. Vol. 1: Part A. 5.4.2 Key Generation.
  • Bluetooth Specification Version 4.2. Vol. 3: Part H. 3.6.1 Key Distribution and Generation.
  • Bluetooth Specification Version 4.2. Vol. 3: Part H. 3.6.2 Encryption Information.
  • Streff K. Haar J. An examination of information security in mobile banking architectures. Journal of Information Systems Applied Research. 2009; 1–14.
  • Oates J. Virus Attacks Mobiles via Bluetooth. Available from: http://www.theregister.co.uk/2004/06/15/symbian_ virus 22-09-2015
  • F-Secure Article on Lasco. A Worm. 2015. Available from: http://www.f-secure.com/v-descs/lasco_a.shtml
  • Shaked Y, Wool A. Cracking the Bluetooth PIN. 2015.Available from: http://www.eng.tau.ac.il/~yash/shakedwoolmobisys05
  • Going Around with Bluetooth in Full Safety. 2015. Available from: http://www.securenetwork.it/ricerca/whitepaper/ download/ bluebag_brochure.pdf
  • F-Secure Article on Lasco. A Worm. 2015. Available from: http://www.f-secure.com/v-descs/lasco_a.shtml
  • Dnyanoba BA, Nagajayanthi B, Ramachandran P.Development of an embedded system to track the movement of bluetooth devices based on RSSI. Indian Journal of Science and Technology. 2015; 8(19):1–7.
  • Nagajayanthi B, Radhakrishnan R, Vijayakaumari V. Healthcare IoT - A multilayer security mechanism using linear programmable pre-coded matrix decomposition method. International Journal of Applied Engineering Research. 2015; 10(24):44554–63.
  • Park J-K, Lee H-S, Kim S-J, Park J-P. A study on secure authentication system using integrated user authentication service. Indian Journal of Science and Technology. 2015; 8(23):1–6.
  • Priyalakshmi B, Kirthi J. Mini UWB-Bluetooth antenna design with band-notched characteristics. Indian Journal of Science and Technology. 2016; 9(1):1–5.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.