Preventing mitm attack in simple secure pairing in Bluetooth
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 6
Abstract
Secure simple pairing has been adopted by Bluetooth version “Bluetooth 2.1+EDR(ENHANCED DATA RATE).It should be noted that for establishing Bluetooth connection that uses Diffie hellman public cryptography in its communication, SSP is a secure method. But it is still prone to attack regardless of the high security mechanism it provides,for example man in middle attack. In this paper we provide a efficient method to prevent man in the middle attack.
Authors and Affiliations
Nishant Mishra , Vishal. Gupta
Network Security Issues and Solutions
Network security is now days becoming more and more important because people like to connect with each other all the time via internet. Personal computer users, employees of professional organizations, government servant...
Handwritten Character Recognition for major Indian Scripts:A Survey
Character Recognition is an active field of research today. It comprises of Pattern Recognition and Image Processing. Character Recognition has gained enormous attention due to its application in various fields. Characte...
SURVEY OF ACCIDENT SEVERITY ESTIMATION USING DATA MINING TECHNIQUES
As technology has been improved by many changes and inventions are made almost every day. Traumatic events come in many different ways at many different times of one’s life. Recent trends on the advantage of communicatio...
Segmentation of Brain Tumour and Its Area Calculation in Brain MR Images using K-Mean Clustering and Fuzzy C-Mean Algorithm
This paper deals with the implementation of Simple Algorithm for detection of range and shape of tumour in brain MR images. Tumour is an uncontrolled growth of tissues in any part of the body. Tumours are of different ty...
Secondary Structure Prediction Using ANN Learning
This paper presents two methods for predicting the secondary structure of proteins based on artificial neural network learning. Two variations of NN learning rule are employed using feedforward backpropogation architectu...