IIUM Repository

Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm

Diallo, Alhassane Saliou and Al-Khateeb, Wajdi Fawzi Mohammed and Olanrewaju, Rashidah Funke and Fatai, Sado (2014) Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm. In: 5th International Conference on Computer and Communication Engineering, 23rd-25th September 2014, Kuala Lumpur .

[img]
Preview
PDF
Download (750kB) | Preview
[img] PDF
Restricted to Repository staff only

Download (446kB) | Request a copy

Abstract

Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN). This is because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS). These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. Bluetooth technology started with a form of pairing called legacy pairing prior to any communication. However, due to the serious security issues found in the legacy pairing, a secure and simple pairing called SPP was announced with Bluetooth 2.1 and later since 2007. SPP has solved the main security issue which is the weaknesses of the PIN code in the legacy pairing, however it has been found with some vulnerabilities such as eavesdropping and man-in-the-middle (MITM) attacks. Since the discovery of these vulnerabilities, some enhancements have been proposed to the Bluetooth Specification Interest Group (SIG) which is the regulatory body of Bluetooth technology; nevertheless, some proposed enhancements are ineffective or are not yet implemented by Manufacturers. Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. The result was verified on a Graphical User Interface (GUI) built in Microsoft Visual Studio 2010 with C sharp as default environment. It has shown that the proposed scheme works perfectly with the used hardware and software. In addition, the protocol thwarts the passive and active eavesdropping attacks which exist during SSP. These attacks are defeated by avoiding the exchange of passwords and public keys in plain text between the Master and the Slave. Therefore, this protocol is expected to be implemented by the SIG to enhance the security in Bluetooth connection.

Item Type: Conference or Workshop Item (UNSPECIFIED)
Additional Information: 2099/39193
Uncontrolled Keywords: Bluetooth security; authentication; secure and simple pairing; legacy pairing; HMAC algirithm
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices > TK7885 Computer engineering
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Engineering > Department of Electrical and Computer Engineering
Depositing User: Dr. Rashidah Funke Olanrewaju
Date Deposited: 19 Nov 2014 09:43
Last Modified: 11 Jun 2018 13:09
URI: http://irep.iium.edu.my/id/eprint/39193

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year