Analysis of bluetooth threats and v4.0 security features (learning association rule)

Author: 
Aditi Vats, Kritika Singh, Dharmveer Singh Rajpoot

In today’s world the technology which is made wireless communication easier is Bluetooth technology which is used for transferring data in short range. People who are looking to gain information in an unauthorized manner is viewed very closely to any new improvement or invention. Security of data is very important aspect in Bluetooth .Bluetooth security has many other different versions of Bluetooth regarding security and speed of transferring the data which is to be according to the need and demand .Mainly this paper covers man in the middle attack security issues .There will be eavesdropping and MITM attacks when we establish encryption key between two Bluetooth devices. A schema has been designed which is called secure key agreement and is based on elliptic curves cryptography and interlock protocol. It provides an authentication which is bidirectional for two devices and it also provide key integrity verification by exchanging the keys Hash-values which is generated by both the ends. Thus the security is analyzed properly. The results of the method proposed is secure and efficient.

Paper No: 
472