A Survey over the Security Issues of Bluetooth using Elliptic Curve Cryptography

ثبت نشده
چکیده

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The ECC is the latest and fastest encryption method which offers stronger security. As it is known that although a vast majority of devices currently now communicates using Bluetooth methodology, the blue tooth security expert provides automatic updates to its security protocol and user privacy protection techniques. Further protection of the device user’s personal information becomes the primary aim. The research work also explores the Bucket Brigade Attack on Bluetooth security using Elliptic Curve Cryptography (ECC). Also it is implied that Bucket Brigade Attack(BBA) is one of the amazing solution to the problem of key agreement or key swapping. Further the beauty of this scheme is when two parties who likes to communicate using symmetric key and an Elliptic Curve Cryptography(ECC) an Intruder(Hacker) enters in between a sender and a receiver. This paper is an attempt to

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey over the Security Issues of Bluetooth using Elliptic Curve Cryptography

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The...

متن کامل

A Survey over the Security Issues of Bluetooth using Elliptic Curve Cryptography

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The...

متن کامل

A Survey over the Security Issues of Bluetooth using Elliptic Curve Cryptography

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The...

متن کامل

A Survey over the Security Issues of Bluetooth using Elliptic Curve Cryptography

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The...

متن کامل

A Survey over the Security Issues of Bluetooth using Elliptic Curve Cryptography

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017