Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing
نویسندگان
چکیده
As an open standard for the short-range radio frequency communications, Bluetooth is suitable Mobile Crowdsensing Systems (MCS). However, massive deployment of personal Bluetooth-enabled devices also raises privacy concerns on their wielders. Hence, we investigate unilateral authentication protocol according to recent v5.2. The contributions paper are twofold. (1) We demonstrate that suffers from weakness. That is, attacker able identify target device once he observed device’s previous transmitted messages during run. More importantly, analyze threat MCS, when exploits proposed weakness under typical Internet Things (IoT) scenarios. (2) An improved therefore devised repair Under our formal model, provably solves traceability problem original in standard. Additionally, can be easily adapted standards because it merely employs basic cryptographic components available specifications. In addition, suggest and evaluate two countermeasures, which do not need modify protocol.
منابع مشابه
Secure and Lightweight Authentication Protocol for Mobile RFID Privacy
A mobile RFID system is a radio frequency identification technology that allows users to read the information on its tags. When this free reading function is combined with a mobile RFID system featuring radio frequency identification, it may violate an individuals privacy. This is because others may obtain personal information by reading the tags. In addition, user tracking can be a problem, be...
متن کاملAn Efficient Authentication Protocol Supporting Privacy in Mobile Computing Environments
The anticipated increase in mobility and popular use of the mobile services will require more technologies for authenticating mobile hosts and protecting their privacy. However, the issues such as privacy and confidentiality in mobile computing environments and the resource restriction of mobile hosts have not been given enough consideration. In this paper, we present an authentication protocol...
متن کاملPrivacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication
This article introduces a new transaction protocol using mobile agents in electronic commerce. The authors first propose a new model for transactions in electronic commerce, mutual authenticated transactions using mobile agents. They then design a new protocol by this model. Furthermore, the authors analyse the new protocol in terms of authentication, construction, and privacy. The aim of the p...
متن کاملAuthentication and payment protocol preserving location privacy in mobile IP
Mobile IP enables a mobile node (MN) to move around without losing their transport-layer connectivity by using resources in a foreign domain network. Mobile IP (MIP) is expected to be the core infrastructure of future mobile communication, but two services must be provided before the wide deployment of MIP. One is to provide secure communication and the other is to make payment. Security servic...
متن کاملMobile Node Authentication Protocol for Proxy Mobile
We are now going to the 4G network and in the 4G network environment, there are so many devices connected to the Internet while they move. We have protocol that can support movement of communicating node without any disruption of their connection status named Mobile IP(MIP). But, the major problem of this MIP is too heaviness of the protocol for small mobile nodes. So, IETF now propose PMIP to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2021
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2021/5598574