Enhancement of bluetooth security authentication using Hash-Based Message Authentication Code (HMAC) algorithm /

Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN). This is because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS). These two characteristics have led to r...

Full description

Saved in:
Bibliographic Details
Main Author: Saliou, Diallo Alhassane
Format: Thesis
Language:English
Published: Kuala Lumpur : Kulliyyah of Engineering, International Islamic University Malaysia, 2015
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/4764
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN). This is because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS). These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. Bluetooth technology which was developed in 1994 uses either legacy pairing (LP) or secure and simple pairing (SSP) to establish a link key for authentication. However, due to the serious security issues found in the legacy pairing, a secure and simple pairing (SSP) was announced with Bluetooth 2.1 and later since 2007. SSP has solved the main security issue which is the weaknesses of the Personal Identity Number (PIN) code in the legacy pairing, however it has been found with some vulnerabilities such as eavesdropping and man-in-the-middle (MITM) attack. Since the discovery of these vulnerabilities, some enhancements of SSP have been proposed to the Bluetooth Specification Interest Group (SIG) which is the regulatory body of Bluetooth technology; nevertheless, some proposed enhancements are ineffective or are not yet implemented by Manufacturers. Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol for enhancing the security of Bluetooth authentication uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Seeed Studio Arduino Compatible Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. The feasibility of the model was verified on a Graphical User Interface (GUI) built in Microsoft Visual Studio 2010 with C sharp as default environment. The result has shown that the proposed scheme provides better resistance against brute force attack compared to the existing scheme. Moreover, passive and active eavesdropping attacks are thwarted by the use of the Rivest-Shamir-Adleman (RSA) algorithm and by storing public keys in the Master's database prior to starting the protocol. Besides that, the running time of the model is found to be 11.22 seconds and the time complexity is O (ln) which is a linear complexity. Therefore, this protocol is expected to be implemented by the S.I.G to enhance the security in Bluetooth connection.  
Physical Description:xxi, 180 leaves : ill. ; 30cm.
Bibliography:Includes bibliographical references (leaves 159-164)