Secure authorization, access control and data integrity in Bluetooth

L. Nguyen, R. Safavi-Naini, W. Susilo, T. Wysocki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Bluetooth standard has a provision for mutual authentication of connecting devices but not their actual users and allows access control during connection setup only. We propose a user authorization and pairing (UAP) application, that has the ability to perform authentication and authorization of users using role based model. The pairing procedure, which exchanges link key between devices, is also performed as a part of the user authorization process. The integrity of the message is guaranteed by using message authentication codes. We also extend an attack on a short PIN during the pairing procedure for devices compliant with the Bluetooth specification version 1.1.

Original languageEnglish (US)
Title of host publicationProceedings - 10th IEEE International Conference on Networks
Subtitle of host publicationTowards Network Superiority, ICON 2002
Pages428-433
Number of pages6
DOIs
StatePublished - Dec 1 2002
Event10th IEEE International Conference on Networks: Towards Network Superiority, ICON 2002 - Singapore, Singapore
Duration: Aug 27 2002Aug 30 2002

Publication series

NameIEEE International Conference on Networks, ICON
ISSN (Print)1556-6463

Other

Other10th IEEE International Conference on Networks: Towards Network Superiority, ICON 2002
CountrySingapore
CitySingapore
Period8/27/028/30/02

Fingerprint

Bluetooth
Access control
Authentication
Specifications

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering
  • Safety, Risk, Reliability and Quality

Cite this

Nguyen, L., Safavi-Naini, R., Susilo, W., & Wysocki, T. (2002). Secure authorization, access control and data integrity in Bluetooth. In Proceedings - 10th IEEE International Conference on Networks: Towards Network Superiority, ICON 2002 (pp. 428-433). [1033349] (IEEE International Conference on Networks, ICON). https://doi.org/10.1109/ICON.2002.1033349

Secure authorization, access control and data integrity in Bluetooth. / Nguyen, L.; Safavi-Naini, R.; Susilo, W.; Wysocki, T.

Proceedings - 10th IEEE International Conference on Networks: Towards Network Superiority, ICON 2002. 2002. p. 428-433 1033349 (IEEE International Conference on Networks, ICON).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nguyen, L, Safavi-Naini, R, Susilo, W & Wysocki, T 2002, Secure authorization, access control and data integrity in Bluetooth. in Proceedings - 10th IEEE International Conference on Networks: Towards Network Superiority, ICON 2002., 1033349, IEEE International Conference on Networks, ICON, pp. 428-433, 10th IEEE International Conference on Networks: Towards Network Superiority, ICON 2002, Singapore, Singapore, 8/27/02. https://doi.org/10.1109/ICON.2002.1033349
Nguyen L, Safavi-Naini R, Susilo W, Wysocki T. Secure authorization, access control and data integrity in Bluetooth. In Proceedings - 10th IEEE International Conference on Networks: Towards Network Superiority, ICON 2002. 2002. p. 428-433. 1033349. (IEEE International Conference on Networks, ICON). https://doi.org/10.1109/ICON.2002.1033349
Nguyen, L. ; Safavi-Naini, R. ; Susilo, W. ; Wysocki, T. / Secure authorization, access control and data integrity in Bluetooth. Proceedings - 10th IEEE International Conference on Networks: Towards Network Superiority, ICON 2002. 2002. pp. 428-433 (IEEE International Conference on Networks, ICON).
@inproceedings{f7dc01bf50e642278fdcf7547e45bc56,
title = "Secure authorization, access control and data integrity in Bluetooth",
abstract = "Bluetooth standard has a provision for mutual authentication of connecting devices but not their actual users and allows access control during connection setup only. We propose a user authorization and pairing (UAP) application, that has the ability to perform authentication and authorization of users using role based model. The pairing procedure, which exchanges link key between devices, is also performed as a part of the user authorization process. The integrity of the message is guaranteed by using message authentication codes. We also extend an attack on a short PIN during the pairing procedure for devices compliant with the Bluetooth specification version 1.1.",
author = "L. Nguyen and R. Safavi-Naini and W. Susilo and T. Wysocki",
year = "2002",
month = "12",
day = "1",
doi = "10.1109/ICON.2002.1033349",
language = "English (US)",
isbn = "0780375335",
series = "IEEE International Conference on Networks, ICON",
pages = "428--433",
booktitle = "Proceedings - 10th IEEE International Conference on Networks",

}

TY - GEN

T1 - Secure authorization, access control and data integrity in Bluetooth

AU - Nguyen, L.

AU - Safavi-Naini, R.

AU - Susilo, W.

AU - Wysocki, T.

PY - 2002/12/1

Y1 - 2002/12/1

N2 - Bluetooth standard has a provision for mutual authentication of connecting devices but not their actual users and allows access control during connection setup only. We propose a user authorization and pairing (UAP) application, that has the ability to perform authentication and authorization of users using role based model. The pairing procedure, which exchanges link key between devices, is also performed as a part of the user authorization process. The integrity of the message is guaranteed by using message authentication codes. We also extend an attack on a short PIN during the pairing procedure for devices compliant with the Bluetooth specification version 1.1.

AB - Bluetooth standard has a provision for mutual authentication of connecting devices but not their actual users and allows access control during connection setup only. We propose a user authorization and pairing (UAP) application, that has the ability to perform authentication and authorization of users using role based model. The pairing procedure, which exchanges link key between devices, is also performed as a part of the user authorization process. The integrity of the message is guaranteed by using message authentication codes. We also extend an attack on a short PIN during the pairing procedure for devices compliant with the Bluetooth specification version 1.1.

UR - http://www.scopus.com/inward/record.url?scp=33744981160&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33744981160&partnerID=8YFLogxK

U2 - 10.1109/ICON.2002.1033349

DO - 10.1109/ICON.2002.1033349

M3 - Conference contribution

AN - SCOPUS:33744981160

SN - 0780375335

SN - 9780780375338

T3 - IEEE International Conference on Networks, ICON

SP - 428

EP - 433

BT - Proceedings - 10th IEEE International Conference on Networks

ER -