International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 161 - Number 8 |
Year of Publication: 2017 |
Authors: Ahmad Hweishel A. Alfarjat, H. S. Sheshadri, Hanumanthappa J. |
10.5120/ijca2017913252 |
Ahmad Hweishel A. Alfarjat, H. S. Sheshadri, Hanumanthappa J. . A Mathematical Model to the Security Issues of Bluetooth using Elliptic Curve Cryptography. International Journal of Computer Applications. 161, 8 ( Mar 2017), 31-37. DOI=10.5120/ijca2017913252
In this research paper,we are addressing the problem of aalgorithms for Wireless LAN for Secured Transmission. Our research work also proposes an overview of some of the major attacks that Bluetooth has faced over the years along with some possible solutions. The main aim of our research work also investigates security features of Bluetooth using Elliptic Curve Cryptography(ECC). The ECC is the latest and fastest encryption method which offers stronger security. As we know that although a vast majority of devices already currently now communicates using Bluetooth methodology. The Bluetooth security expert provides automatic updates to its security protocol and user privacy protection technique for every security breach so that protection of the device user’s personal information becomes the primary aim. The research work also explores the Bucket Brigade Attack on Bluetooth security using Elliptic Curve Cryptography(ECC). As we know that Bucket Brigade Attack(BBA)(MITM)(WITM) is one of the amazing solution to the problem of key agreement or key swapping. The beauty of this scheme is when two parties who likes to communicate using symmetric key and an Elliptic Curve Cryptography(ECC) an Intruder(Hacker) enters in between a sender and a receiver.