SlideShare a Scribd company logo
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 720
e-ISSN: 2349-9745
p-ISSN: 2393-8161
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION
FOR MOBILE DEVICE
P.Sindhuja1
, S.Uma2
, D.Deepachandra3
, M.Poovizhi3
1,2,3,4
Computer Science and Engineering, Hindustan Institute of Technology
Abstract- Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
Keywords- Bluetooth, Authentication, Seeing-is- Believing (SiB), Quick Response Code, Discrete
logarithm problem.
I. INTRODUCTION
1.1 ANDROID
Android is a mobile operating system developed by Google. It is used by several smart phones, such
as the Motorola Droid, the Samsung Galaxy, and Google's own Nexus One. The Android operating
system (OS) is based on the open Linux kernel. Unlike the phone OS, Android is open source,
meaning developers can modify and customize the OS for each phone. Therefore, different Android-
based phones may have different graphical user interfaces GUIs even though they use the same OS.
Android phones typically come with several built-in applications and also support third-party
programs. Developers can create programs for Android using the free Android SDK (Software
Developer Kit). Android programs are written in Java and run through Google's "Davlik" virtual
machine, which is optimized for mobile devices. Users can download Android "apps" from the
online Android Market. Since several manufacturers make Android-based phones, it is not always
easy to tell if a phone is running the Android operating system. If you are unsure what operating
system a phone uses, you can often find the system information by selecting g "About" in the
Settings menu. The name "Android" comes from the term android, which refers to a robot designed
to look and act like a human.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 721`
II. LITERATURE SURVEY
Two entities, who only share a password, and who are communicating over an insecure network,
want to authenticate each other and agree on a large session key to be used for protecting their
subsequent communication. This is called the password-authenticated key exchange problem. If one
of the entities is a user and the other is a server, then this can be seen as a problem in the area of
remote user access. Many solutions for remote user access rely on cryptographically secure keys,
and consequently have to deal with issues like key management, public-key infrastructure, or secure
hardware. Many solutions that are password-based, like telnet or Kerberos, have problems that range
from being totally insecure (telnet sends passwords in the clear) to being susceptible to certain types
of attacks (Kerberos is vulnerable to o®-line dictionary attacks.
A new password-authenticated key exchange protocol called PAK (Password Authenticated Key
exchange) is presented which provides perfect forward secrecy and is proven to be as secure as
Decision Diffie-Hellman in the random oracle model. Compared to the protocol of, PAK (1) does
not require the RSA assumption, (2) has fewer rounds, and (3) is conceptually simpler, with a
simpler proof. Compared to the protocol, PAK does not require an ideal block cipher assumption for
security, but has a more complicated proof.
In the full work, also show how the security of PAK can be related to the Computational Diffie-
Hellman problem. In addition to PAK, also show a more efficient 2 round protocol called PPK
(Password-Protected Key exchange) that is provably secure in the implicit- authentication model.
Then extend PAK to a protocol called PAK-X, in which one side (the client) stores a plaintext
version of the password, while the other side (the server) only stores a verifier for the password.
Formally prove security of PAK-X, even when the server is compromised. Security in this case
refers to an attacker not being able to pose as a client after compromising the server; naturally, it
would be trivial to pose as the server. Limitations are consider as high complexity and highly
expensive. Entity authentication and authenticated key establishment are of fundamental importance
in establishing secure communications between a pair of communicating parties.
Entity authentication is normally provided when a communications link is established and, if an
authenticated key is established simultaneously, this can be used to protect subsequently exchanged
data. The purpose of this work is to examine how these services might best be achieved for personal
wireless-enabled devices. Manual authentication techniques have been designed to enable wireless
devices to authenticate one another via an insecure wireless channel with the aid of a manual transfer
of data between the devices. Manual transfer refers to the human operator of the devices performing
one of the following procedures: copying data output from one device into the other device,
comparing the output of the two devices, or entering the same data into both devices.
Techniques currently being standardized are described which achieve this, and which require only
small amounts of data to be transferred between the two devices. This makes the mechanisms
particularly attractive for non-expert use, as required for ubiquitous mobile wireless devices.
Limitations are consider as High storage is required and less secure. Security in wireless network is
becoming more and more important while the using of mobile equipment’s such as cellular phones
or laptops is tremendously increasing. Due to the unique characteristic of wireless network, unlike
wire line networks, to achieve this goal is never a trivial challenge. Mobile ad hoc networks
(MANETs) is a special wireless network which does not rely on any fixed infrastructure but depends
on the cooperation between each node like a cellular phone in the network. In this essay discuss the
possible attacks in MANETs and briefly discuss the solutions aimed to these problems.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 722`
Address the problem of secure communication and authentication in ad-hoc wireless networks. This
is a difficult problem, as it involves bootstrapping trust between strangers. A user-friendly solution is
presented which provides secure authentication using almost any established public-key-based key
exchange protocol, as well as inexpensive hash-based alternatives. In this approach, devices
exchange a limited amount of public information over a privileged side channel, which will then
allow them to complete an authenticated key exchange protocol over the wireless link. This solution
does not require a public key infrastructure, is secure against passive attacks on the privileged side
channel and all attacks on the wireless link, and directly captures users’ intuitions that they want to
talk to a particular previously unknown device in their physical proximity limitations are consider as
High complexity and Communication cost is high.
Obtaining authenticated values from devices in ways that are easily understandable by non-expert
users is currently an open problem. The Seeing-Is-Believing is analyzed which is a system that
utilizes 2D barcodes and camera phones to implement a visual channel for authentication and
demonstrative identification of devices. As camera-equipped mobile phones rapidly approach
ubiquity, these devices become a naturally convenient platform for security applications that can be
deployed quickly and easily to millions of users. Today's mobile phones increasingly feature Internet
access and come equipped with cameras, high-quality displays, and short range Bluetooth wireless
radios.
They are powerful enough to perform secure public key cryptographic operations in fewer than one
second. Propose to use the camera on a mobile phone as a new visual channel to achieve
demonstrative identification of communicating devices formerly unattainable in an intuitive way.
This approach is termed as Seeing-Is-Believing (SiB). In SiB, one device uses its camera to take a
snapshot of a barcode encoding cryptographic material identifying, e.g., the public key of another
device. This is called as a visual channel. Barcodes can be pre-configured and printed on labels
attached to devices, or they can be generated on-demand and shown on a device's display.
Apply this visual channel to several problems in computer security. SiB can be used to bootstrap
authenticated key exchange between devices that share no prior context, including such devices as
mobile phones, wireless access points, and public printers. The SiB is used to aid in the
establishment of a trusted path for configuration of a TCG-compliant1 computing platform, and to
provide the user with assurance in the integrity of an application running on a TCG-compliant
computing platform. Also use SiB to secure device configuration in the context of a smart home.
Limitations are consider as Unaware of any attacks feasible today which result in anything but noise
from the camera under attack.
III. EXISTING WORK
Practical requirements for securely demonstrating identities between two handheld devices are often
omitted by theoretical protocol designers. Existing system, a scheme is developed named Seeing-is-
Believing (SiB) which uses the display of a mobile phone to demonstrate its identity to a handheld
device equipped with a screen.
The idea of their scheme is that a handheld device generates a temporal public key and sends it to
another handheld device through the wireless channel, like Bluetooth. This device also creates a
commitment of the public key in the form of a visual code, and displays the code as a digital image
on its display. The other handheld device photographs this code using its screen and verifies the
public key using this public key commitment. This public key allows the receiver to authenticate the
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 723`
sender after executing some simple confirmation steps. Yet, there are also some disadvantages in Sib
the first problem is scalability. Sib protocol supports secure authentication for two handheld devices.
Adopting transitive authentication may solve the scalability problem. If the devices owners trust
each other in the way that each participant would not intentionally eavesdrop other parties’
communication and damage the protocol, it is possible to simplify the protocol. The idea of
transitive authentication says that a device can authenticate other strange devices through another
broker.
Solve the second problem, attempt to propose a method that only requires one photo-taking. To
observe that most mobile phones and PDAs have their cameras located at the back of the devices.
When the devices are taking photo of each other screens, it is very likely that a device’s monitor will
be covered by another device. It means that the visual code displayed on the device cannot be easily
obtained by hidden adversary.
The adversary may utilize a highly sophisticated telescope to capture the screen of the user’s device.
Fortunately, this can be prevented with a privacy protection filter on the mobile device’s display. As
a result, it is reasonable to believe that short range photo taking provides not only data integrity but
also data confidentiality. In that case, it is possible for us to devise a system that takes only one
photo during the authentication protocol.
3.1.1 Limitations of the Existing System
The Existing System has the limitations which are related to the knowledge about the different
attributes and the other is about the algorithm used in existing system and the last is that which deals
with the performance of the system. Some of the Limitations of the existing system are given below;
 Insider attack is not detected
 Less efficient
 Less security.
IV. PROPOSED WORK
Trust score based method is introduced which computes the trust values for the nodes and provide
the security. Trust is an important aspect of mobile devices. It enables entities to cope with
uncertainty and uncontrollability caused by the free will of others. Trust computations and
management are highly challenging issues in mobile devices due to computational complexity
constraints, and the independent movement of component nodes. This prevents the direct application
of techniques suited for other networks.
QR code (abbreviated from Quick Response Code). The QR Code system has become popular
outside the automotive industry due to its fast readability and greater storage capacity compared to
standard UPC barcodes. Applications include product tracking, item identification, time tracking,
document management, general marketing. A QR code consists of black modules (square dots)
arranged in a square grid on a white background, which can be read by an imaging device (such as a
camera) and processed using Reed–Solomon error correction until the image can be appropriately
interpreted. The required data are then extracted from patterns present in both horizontal and vertical
components of the image.
Reputation based Trust Score Calculation for mobile devices have been proposed. This architecture
is for establishment of the trust for a newly entering node in the mobile devices. Method the
behavior of the node will be monitored periodically and its trust value is also updated .So depending
on the behavior of the node in the network trust relation will be established between two nodes.

Recommended for you

Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones

Sbvlc secure barcode based visible light communication for smartphones Do Your Projects With Technology Experts To Get this projects Call : 9566355386 / 99625 88976 Web : http://www.lemenizinfotech.com Web : http://www.ieeemaster.com Mail : projects@lemenizinfotech.com Blog : http://ieeeprojectspondicherry.weebly.com Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/ Youtube:https://www.youtube.com/watch?v=eesBNUnKvws

sbvlc secure barcode based visible light communicaandroid ieee projects 2015-2016
Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404

This document proposes an architecture called a pervasive public key infrastructure (pervasive-PKI) to provide authentication and authorization for mobile users across heterogeneous networks. The pervasive-PKI allows credential validation when centralized PKI services are unavailable due to disconnection or limited device capabilities. It includes three software components installed on user devices: 1) a Pervasive Trust Management component that handles trust information and certificate validation, 2) a Privilege Verifier that validates attribute certificates, and 3) an Access Control Engine that makes access decisions based on the other components. These components allow credential validation, authentication, and authorization to occur even when global connectivity and centralized services are lost.

Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry

is SDN (Software Defined Networking) the next big thing in Network Security, or another headache and potential skills gap for the next generation of business networks?

cyber securitynetwork securitysdn
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 724`
4.1 MODULE DESCRIPTION
 Pairing of Bluetooth devices Module
 Initialization process Module
 Bipartite Authentication Protocol Module
 Tripartite Authentication Protocol Module
1.1.1 Pairing of Bluetooth devices Module
The two devices are connected to transmit the data. Firstly, Request the BLUETOOTH
PERMISSION in order to perform any Bluetooth communication, such as requesting a connection,
accepting a connection and transferring the data. After that, Device discovery is a scanning
procedure and searches the local area for Bluetooth enabled devices. If the Bluetooth device is
currently enabled to be discoverable then only it will respond to the discovery request. If the device
is discoverable then it will respond by sharing some information such as device name, class and its
unique MAC address. First time connection request automatically presented to the user. The
information can be read using the Bluetooth APIs.
4.1.2 Pairing of Bluetooth devices Module
The two devices are connected to transmit the data. Firstly, Request the BLUETOOTH
PERMISSION in order to perform any Bluetooth communication, such as requesting a connection,
accepting a connection and transferring the data. After that, Device discovery is a scanning
procedure and searches the local area for Bluetooth enabled devices.
If the Bluetooth device is currently enabled to be discoverable then only it will respond to the
discovery request. If the device is discoverable then it will respond by sharing some information
such as device name, class and its unique MAC address. First time connection request automatically
presented to the user. The information can be read using the Bluetooth APIs.
4.1.3 Initialization process Module
Bilinear pairing is a main component in constructing our tripartite protocol. Firstly briefly review
some basic facts of bilinear pairing. Let be an additive group with order q and be a
multiplicative group. Given P is a generator of assume discrete logarithm problem (DLP) is hard
in i.e., given the instance p, it is difficult to calculate a. To say a mapping function e is
bilinear if satisfies the following properties:
Bilinearity: ( ) ( ) for all and . Also for (
) ( ) ( ) and ( ) ( ) ( )
Non-degeneracy: ( ) is the generator of if P is the generator of . In other
words, ( )
Computable: There exist an efficient algorithm to compute ( )
Next, state some famous hard problems related to bilinear pairings and elliptic curves.
Computational Diffie-Hellman Problem (CDH): The CDH problem states that given two elements
and a generator P in as inputs where output abP. An algorithm
has advantage in solving CDH if
* ( ) +
Where the probability is over the random choice of generator the random choice of
and the random bits consumed by .CDH assumption: To say that the ( ) assumption
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 725`
holds in if no t-time algorithm has an advantage more than ϵin solving CDH problem
in .Bilinear Diffie-Hellman Problem (BDH): The BDH problem states that given three
elements , a generator P in and a bilinear pairing function
as inputs, where output ( ) . An algorithm has advantage in solving
BDH if
( ( ) ( ) +
Where the probability is over the random choice of generator the random choice of
and the random bits consumed by .
BDH assumption: To say that the ( ) holds in to if no algorithm has an
advantage more than in solving BDH problem using bilinear map .
4.1.4 Bipartite Authentication Protocol Module
Present the bipartite authentication protocol using encryptions E and MACs M. Assume there are
two handheld devices A and B want to authenticate each other such that A is equipped with a high
resolution display and B is equipped with a camera. A initiates the protocol by randomly selecting an
integer calculating and generating two k-bits long random keys and . Then,
A calculates and sends the following tuples to B.
( ) ( ( ) ( ) )
At the same time, it encodes and into a visual code and displays it on screen. Note that is
encrypted; thus, the adversary cannot forge valid MAC value and further launch MITM attack.
After receiving the tuples above, B takes a photograph of the visual code with its screen to obtain the
key ̂ and ̂ . Then, it verifies the tuples using ̂ and decrypts using ̂ to obtain ̂ . If the
message is authenticated, B will consider A is a trusted device. Otherwise, it will terminate the
process.
B also selects a random integer and calculates After that, it computes
( ̂ ). Finally, it prepares the following tuples and sends them to A.
( ) ( ) )
After receiving the tuples from B,A computes ̂ ( ). Then, A verifies if
̂ ( ) If it does, A will authenticate B as a trusted device. Each of them will utilize a l-bit key
( ̂ ) ( ̂ ) as their session key for further communication. The completeness of the
protocol is asserted by assuming there is no adversary in the environment. Notice that
( ̂ ) ( ̂ ). Therefore A and B will be mutually authenticated if the tuples they send are
unaltered.
4.2 Advantages of the Proposed System
 Insider attack is detected
 High efficient
 High secure
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 726`
Fig 2.1 System Architecture Diagram
V. CONCLUSION
Agreeing key in ad-hoc environment securely is an important topic. Most of the previous schemes
only focus on two parties’ case and are overcomplicated. In this work the efficient key agreement
protocols are developed for two and three handheld devices over temporal confidential and
authenticated channels.
Create the tuples
by one device
Generate the
random keys
Encodes the keys into visual
codes and displays on the
screen
Scalable
authentication
protocol
Trust score based
method
Receives the tuples by
another device
Verify the tuples
Bipartite
authentication
Multipartite
authenticatio
n
Tripartite
authentication
Compute the
trust score for
the nodes
Update the trust
values
Detect the attacks
Analyze the
behavior
Performance comparison
Mobile
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 727`
They simplify previous unnecessary complications and reduce the bottleneck of running time –
human’s involvements. This system enjoys several nice properties including efficient, human error
proof, and secure. By satisfying the above practical requirements, these protocols have improved
previous scheme significantly. But the insider attacks are not detected in this method.
REFERENCES
[1] Apkun S.C, Hubaux .J, and Buttya´n .C, “Mobility helps security in ad hoc networks,” in Proc. of the 4th ACM
Symposium on Mobile ad hoc Networking & Computing, 2011, pp. 46–56.
[2] Barua .R, Dutta .R, and Sarkar .P, “Extending Joux’s protocol to multi party key agreement,” in Progress in
Cryptology–INDOCRYPT, 2003, pp. 205–217.
[3] Balfanz .D, Smetters .D, Stewart .P, and Wong .H, “Talking to strangers: Authentication in ad-hoc wireless
networks,” in Proc. of the 9th Symposium on Network and Distributed System Security Symposium
[4] Blake-Wilson .S and Menezes .A,“Entity authentication and authenticated key transport protocols employing
asymmetric techniques,” Security Protocols Workshop, vol. 97, 1997.
[5] Bellare .M and Rogaway .P, “Entity authentication and key distribution,” in Proc. of the Advances in Cryptology-
CRYPTO, vol. 773, 1993, pp. 232–249.
[6] Boyko .V, MacKenzie .P, and Patel .S, “Provably Secure Password- Authenticated Key Exchange Using Diffie-
Heilman,” Proceedings of the Advances in Cryptology-Eurocrypt, 2009
[7] Bellovin S.M, and Merritt.M, “Augmented encrypted key exchange: a password-based protocol secure against
dictionary attacks and password file compromise,” in Proc. 1st ACM conf. on Computer and Communications
Security, pp. 244–250.
[8] Gehrmann .C, Mitchell .C, and Nyberg .K, “Manual authentication for wireless devices,” RSA Cryptobytes, vol. 7,
no. 1, pp. 29–37, 2004
[9] Bluetooth .S, “The official Bluetooth wireless info site,” 2011.
[10] Chen et al., “GAnGS: Gather, authenticate ’n group securely,” in Proc. of the 4th ACM Inter. Conf. on Mobile
Computing and Networking. ACM New York, NY, USA, pp. 92–103.

Recommended for you

Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones

This document summarizes a research paper that proposes SBVLC, a secure system for barcode-based visible light communication between smartphones. It analyzes the security of transmitting barcode streams between device screens and cameras. Three secure data exchange schemes are developed to encode information in barcode streams. The system achieves high security and throughput comparable to NFC. It can enable private information sharing, secure device pairing and contactless payments. Rigorous geometric models were used to examine the system's security, making it the first work to formally study security of VLC and barcode communication between smartphones.

sbvlc secure barcode based visible light communica
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and

This document discusses network security and cryptography. It begins by introducing network security concepts like secrecy, authentication, nonrepudiation, and integrity. It then discusses cryptography topics such as symmetric and public key encryption. Specific algorithms like RSA are explained. The document also discusses security issues at different layers of the network and summarizes techniques used at each layer.

A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...

This document summarizes a research paper on enhancing RFID security and privacy through location sensing. It discusses how location awareness can be used by RFID tags and backend servers to defend against unauthorized reading and relay attacks. On tags, a location-aware selective unlocking mechanism is designed to allow tags to selectively respond based on location rather than always responding. On servers, a location-aware secure transaction verification scheme is proposed to allow servers to approve or deny transactions based on comparing the reported locations of the tag and reader. The goal is to detect relay attacks involving malicious readers. Unlike prior work, the defenses do not rely on auxiliary devices and require no explicit user involvement.

SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE

More Related Content

What's hot

Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
TELKOMNIKA JOURNAL
 
Ransomware protection in loT using software defined networking
Ransomware protection in loT using software  defined networking  Ransomware protection in loT using software  defined networking
Ransomware protection in loT using software defined networking
IJECEIAES
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
Putra Wanda
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
 
Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404
Editor IJARCET
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
aap3 IT Recruitment
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
Iaetsd Iaetsd
 
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
pharmaindexing
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
IJECEIAES
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
IJCNCJournal
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
IJwest
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
IJECEIAES
 
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSA GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
IJNSA Journal
 
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORKCOMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
ijesajournal
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
CSCJournals
 
2014 2015 ieee android project titles,2014 - 2015 ieee project list for free...
2014 2015 ieee  android project titles,2014 - 2015 ieee project list for free...2014 2015 ieee  android project titles,2014 - 2015 ieee project list for free...
2014 2015 ieee android project titles,2014 - 2015 ieee project list for free...
Papitha Velumani
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
Chintan Patel
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
IJSRED
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
IJERA Editor
 

What's hot (20)

Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Ransomware protection in loT using software defined networking
Ransomware protection in loT using software  defined networking  Ransomware protection in loT using software  defined networking
Ransomware protection in loT using software defined networking
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
 
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
 
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSA GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
 
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORKCOMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
 
2014 2015 ieee android project titles,2014 - 2015 ieee project list for free...
2014 2015 ieee  android project titles,2014 - 2015 ieee project list for free...2014 2015 ieee  android project titles,2014 - 2015 ieee project list for free...
2014 2015 ieee android project titles,2014 - 2015 ieee project list for free...
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 

Similar to SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE

Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
1SI19IS064TEJASS
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
Shreya Pohekar
 
Widipay a cross layer design for mobile payment system over lte direct
Widipay a cross layer design for mobile payment system over lte directWidipay a cross layer design for mobile payment system over lte direct
Widipay a cross layer design for mobile payment system over lte direct
eSAT Journals
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
Stéphane Roule
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
Nirmal Misra
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
IJECEIAES
 
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTING
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTINGKEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTING
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTING
ecij
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
Bharat Tank
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
Lisa Brown
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systems
Kavita Rastogi
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET Journal
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET Journal
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
IJORCS
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
Ahmad Sharifi
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
STO STRATEGY
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
 
Demystifying Gateway Devices: The Backbone of Modern Networking
Demystifying Gateway Devices: The Backbone of Modern NetworkingDemystifying Gateway Devices: The Backbone of Modern Networking
Demystifying Gateway Devices: The Backbone of Modern Networking
Infyiot Solutions
 

Similar to SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE (20)

Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Widipay a cross layer design for mobile payment system over lte direct
Widipay a cross layer design for mobile payment system over lte directWidipay a cross layer design for mobile payment system over lte direct
Widipay a cross layer design for mobile payment system over lte direct
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTING
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTINGKEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTING
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTING
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systems
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
 
Demystifying Gateway Devices: The Backbone of Modern Networking
Demystifying Gateway Devices: The Backbone of Modern NetworkingDemystifying Gateway Devices: The Backbone of Modern Networking
Demystifying Gateway Devices: The Backbone of Modern Networking
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
Editor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
Editor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
Editor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
Editor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
Editor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
Editor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
Editor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
Editor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
Editor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
Editor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
Editor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
Editor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
Editor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
Editor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
Editor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
Editor IJMTER
 
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...
Editor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...
 

Recently uploaded

Germany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptxGermany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptx
rebecca841358
 
Unit 1 Information Storage and Retrieval
Unit 1 Information Storage and RetrievalUnit 1 Information Storage and Retrieval
Unit 1 Information Storage and Retrieval
KishorMahale5
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
maisnampibarel
 
How to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POSHow to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POS
Celine George
 
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Miss Khusi #V08
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
Muanisa Waras
 
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE DonatoCONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
Servizi a rete
 
Rotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptxRotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptx
surekha1287
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
yadavsuyash008
 
Lecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdfLecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdf
peacekipu
 
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
VICTOR MAESTRE RAMIREZ
 
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
PradeepKumarSK3
 
Exploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative ReviewExploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative Review
sipij
 
Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
IIIT Hyderabad
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Bert Blevins
 
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
Jim Mimlitz, P.E.
 
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
ProexportColombia1
 
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model SafePaharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
aarusi sexy model
 
PMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOCPMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOC
itssurajthakur06
 
LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf
pavanaroshni1977
 

Recently uploaded (20)

Germany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptxGermany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptx
 
Unit 1 Information Storage and Retrieval
Unit 1 Information Storage and RetrievalUnit 1 Information Storage and Retrieval
Unit 1 Information Storage and Retrieval
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
 
How to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POSHow to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POS
 
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
 
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE DonatoCONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
 
Rotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptxRotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptx
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
 
Lecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdfLecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdf
 
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
 
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
21EC63_Module1B.pptx VLSI design 21ec63 MOS TRANSISTOR THEORY
 
Exploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative ReviewExploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative Review
 
Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
 
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
 
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
 
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model SafePaharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
 
PMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOCPMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOC
 
LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf
 

SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 720 e-ISSN: 2349-9745 p-ISSN: 2393-8161 SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE P.Sindhuja1 , S.Uma2 , D.Deepachandra3 , M.Poovizhi3 1,2,3,4 Computer Science and Engineering, Hindustan Institute of Technology Abstract- Practical requirements for securely demonstrating identities between two handheld devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to intrude the protocol. Protocols that employ secret keys require the devices to share private information in advance, in which it is not feasible in the above scenario. Apart from insecurely typing passwords into handheld devices or comparing long hexadecimal keys displayed on the devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are only three entities attempt to agree a session key, these protocols need to be rerun for three times. So, in the existing method a bipartite and a tripartite authentication protocol is presented using a temporary confidential channel. Besides, further extend the system into a transitive authentication protocol that allows multiple handheld devices to establish a conference key securely and efficiently. But this method detects only the outsider attacks. Method does not consider the insider attacks. So, in the proposed method trust score based method is introduced which computes the trust values for the nodes and provide the security. The trust score is computed has a positive influence on the confidence with which an entity conducts transactions with that node. Network the behavior of the node will be monitored periodically and its trust value is also updated .So depending on the behavior of the node in the network trust relation will be established between two nodes. Keywords- Bluetooth, Authentication, Seeing-is- Believing (SiB), Quick Response Code, Discrete logarithm problem. I. INTRODUCTION 1.1 ANDROID Android is a mobile operating system developed by Google. It is used by several smart phones, such as the Motorola Droid, the Samsung Galaxy, and Google's own Nexus One. The Android operating system (OS) is based on the open Linux kernel. Unlike the phone OS, Android is open source, meaning developers can modify and customize the OS for each phone. Therefore, different Android- based phones may have different graphical user interfaces GUIs even though they use the same OS. Android phones typically come with several built-in applications and also support third-party programs. Developers can create programs for Android using the free Android SDK (Software Developer Kit). Android programs are written in Java and run through Google's "Davlik" virtual machine, which is optimized for mobile devices. Users can download Android "apps" from the online Android Market. Since several manufacturers make Android-based phones, it is not always easy to tell if a phone is running the Android operating system. If you are unsure what operating system a phone uses, you can often find the system information by selecting g "About" in the Settings menu. The name "Android" comes from the term android, which refers to a robot designed to look and act like a human.
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 721` II. LITERATURE SURVEY Two entities, who only share a password, and who are communicating over an insecure network, want to authenticate each other and agree on a large session key to be used for protecting their subsequent communication. This is called the password-authenticated key exchange problem. If one of the entities is a user and the other is a server, then this can be seen as a problem in the area of remote user access. Many solutions for remote user access rely on cryptographically secure keys, and consequently have to deal with issues like key management, public-key infrastructure, or secure hardware. Many solutions that are password-based, like telnet or Kerberos, have problems that range from being totally insecure (telnet sends passwords in the clear) to being susceptible to certain types of attacks (Kerberos is vulnerable to o®-line dictionary attacks. A new password-authenticated key exchange protocol called PAK (Password Authenticated Key exchange) is presented which provides perfect forward secrecy and is proven to be as secure as Decision Diffie-Hellman in the random oracle model. Compared to the protocol of, PAK (1) does not require the RSA assumption, (2) has fewer rounds, and (3) is conceptually simpler, with a simpler proof. Compared to the protocol, PAK does not require an ideal block cipher assumption for security, but has a more complicated proof. In the full work, also show how the security of PAK can be related to the Computational Diffie- Hellman problem. In addition to PAK, also show a more efficient 2 round protocol called PPK (Password-Protected Key exchange) that is provably secure in the implicit- authentication model. Then extend PAK to a protocol called PAK-X, in which one side (the client) stores a plaintext version of the password, while the other side (the server) only stores a verifier for the password. Formally prove security of PAK-X, even when the server is compromised. Security in this case refers to an attacker not being able to pose as a client after compromising the server; naturally, it would be trivial to pose as the server. Limitations are consider as high complexity and highly expensive. Entity authentication and authenticated key establishment are of fundamental importance in establishing secure communications between a pair of communicating parties. Entity authentication is normally provided when a communications link is established and, if an authenticated key is established simultaneously, this can be used to protect subsequently exchanged data. The purpose of this work is to examine how these services might best be achieved for personal wireless-enabled devices. Manual authentication techniques have been designed to enable wireless devices to authenticate one another via an insecure wireless channel with the aid of a manual transfer of data between the devices. Manual transfer refers to the human operator of the devices performing one of the following procedures: copying data output from one device into the other device, comparing the output of the two devices, or entering the same data into both devices. Techniques currently being standardized are described which achieve this, and which require only small amounts of data to be transferred between the two devices. This makes the mechanisms particularly attractive for non-expert use, as required for ubiquitous mobile wireless devices. Limitations are consider as High storage is required and less secure. Security in wireless network is becoming more and more important while the using of mobile equipment’s such as cellular phones or laptops is tremendously increasing. Due to the unique characteristic of wireless network, unlike wire line networks, to achieve this goal is never a trivial challenge. Mobile ad hoc networks (MANETs) is a special wireless network which does not rely on any fixed infrastructure but depends on the cooperation between each node like a cellular phone in the network. In this essay discuss the possible attacks in MANETs and briefly discuss the solutions aimed to these problems.
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 722` Address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust between strangers. A user-friendly solution is presented which provides secure authentication using almost any established public-key-based key exchange protocol, as well as inexpensive hash-based alternatives. In this approach, devices exchange a limited amount of public information over a privileged side channel, which will then allow them to complete an authenticated key exchange protocol over the wireless link. This solution does not require a public key infrastructure, is secure against passive attacks on the privileged side channel and all attacks on the wireless link, and directly captures users’ intuitions that they want to talk to a particular previously unknown device in their physical proximity limitations are consider as High complexity and Communication cost is high. Obtaining authenticated values from devices in ways that are easily understandable by non-expert users is currently an open problem. The Seeing-Is-Believing is analyzed which is a system that utilizes 2D barcodes and camera phones to implement a visual channel for authentication and demonstrative identification of devices. As camera-equipped mobile phones rapidly approach ubiquity, these devices become a naturally convenient platform for security applications that can be deployed quickly and easily to millions of users. Today's mobile phones increasingly feature Internet access and come equipped with cameras, high-quality displays, and short range Bluetooth wireless radios. They are powerful enough to perform secure public key cryptographic operations in fewer than one second. Propose to use the camera on a mobile phone as a new visual channel to achieve demonstrative identification of communicating devices formerly unattainable in an intuitive way. This approach is termed as Seeing-Is-Believing (SiB). In SiB, one device uses its camera to take a snapshot of a barcode encoding cryptographic material identifying, e.g., the public key of another device. This is called as a visual channel. Barcodes can be pre-configured and printed on labels attached to devices, or they can be generated on-demand and shown on a device's display. Apply this visual channel to several problems in computer security. SiB can be used to bootstrap authenticated key exchange between devices that share no prior context, including such devices as mobile phones, wireless access points, and public printers. The SiB is used to aid in the establishment of a trusted path for configuration of a TCG-compliant1 computing platform, and to provide the user with assurance in the integrity of an application running on a TCG-compliant computing platform. Also use SiB to secure device configuration in the context of a smart home. Limitations are consider as Unaware of any attacks feasible today which result in anything but noise from the camera under attack. III. EXISTING WORK Practical requirements for securely demonstrating identities between two handheld devices are often omitted by theoretical protocol designers. Existing system, a scheme is developed named Seeing-is- Believing (SiB) which uses the display of a mobile phone to demonstrate its identity to a handheld device equipped with a screen. The idea of their scheme is that a handheld device generates a temporal public key and sends it to another handheld device through the wireless channel, like Bluetooth. This device also creates a commitment of the public key in the form of a visual code, and displays the code as a digital image on its display. The other handheld device photographs this code using its screen and verifies the public key using this public key commitment. This public key allows the receiver to authenticate the
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 723` sender after executing some simple confirmation steps. Yet, there are also some disadvantages in Sib the first problem is scalability. Sib protocol supports secure authentication for two handheld devices. Adopting transitive authentication may solve the scalability problem. If the devices owners trust each other in the way that each participant would not intentionally eavesdrop other parties’ communication and damage the protocol, it is possible to simplify the protocol. The idea of transitive authentication says that a device can authenticate other strange devices through another broker. Solve the second problem, attempt to propose a method that only requires one photo-taking. To observe that most mobile phones and PDAs have their cameras located at the back of the devices. When the devices are taking photo of each other screens, it is very likely that a device’s monitor will be covered by another device. It means that the visual code displayed on the device cannot be easily obtained by hidden adversary. The adversary may utilize a highly sophisticated telescope to capture the screen of the user’s device. Fortunately, this can be prevented with a privacy protection filter on the mobile device’s display. As a result, it is reasonable to believe that short range photo taking provides not only data integrity but also data confidentiality. In that case, it is possible for us to devise a system that takes only one photo during the authentication protocol. 3.1.1 Limitations of the Existing System The Existing System has the limitations which are related to the knowledge about the different attributes and the other is about the algorithm used in existing system and the last is that which deals with the performance of the system. Some of the Limitations of the existing system are given below;  Insider attack is not detected  Less efficient  Less security. IV. PROPOSED WORK Trust score based method is introduced which computes the trust values for the nodes and provide the security. Trust is an important aspect of mobile devices. It enables entities to cope with uncertainty and uncontrollability caused by the free will of others. Trust computations and management are highly challenging issues in mobile devices due to computational complexity constraints, and the independent movement of component nodes. This prevents the direct application of techniques suited for other networks. QR code (abbreviated from Quick Response Code). The QR Code system has become popular outside the automotive industry due to its fast readability and greater storage capacity compared to standard UPC barcodes. Applications include product tracking, item identification, time tracking, document management, general marketing. A QR code consists of black modules (square dots) arranged in a square grid on a white background, which can be read by an imaging device (such as a camera) and processed using Reed–Solomon error correction until the image can be appropriately interpreted. The required data are then extracted from patterns present in both horizontal and vertical components of the image. Reputation based Trust Score Calculation for mobile devices have been proposed. This architecture is for establishment of the trust for a newly entering node in the mobile devices. Method the behavior of the node will be monitored periodically and its trust value is also updated .So depending on the behavior of the node in the network trust relation will be established between two nodes.
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 724` 4.1 MODULE DESCRIPTION  Pairing of Bluetooth devices Module  Initialization process Module  Bipartite Authentication Protocol Module  Tripartite Authentication Protocol Module 1.1.1 Pairing of Bluetooth devices Module The two devices are connected to transmit the data. Firstly, Request the BLUETOOTH PERMISSION in order to perform any Bluetooth communication, such as requesting a connection, accepting a connection and transferring the data. After that, Device discovery is a scanning procedure and searches the local area for Bluetooth enabled devices. If the Bluetooth device is currently enabled to be discoverable then only it will respond to the discovery request. If the device is discoverable then it will respond by sharing some information such as device name, class and its unique MAC address. First time connection request automatically presented to the user. The information can be read using the Bluetooth APIs. 4.1.2 Pairing of Bluetooth devices Module The two devices are connected to transmit the data. Firstly, Request the BLUETOOTH PERMISSION in order to perform any Bluetooth communication, such as requesting a connection, accepting a connection and transferring the data. After that, Device discovery is a scanning procedure and searches the local area for Bluetooth enabled devices. If the Bluetooth device is currently enabled to be discoverable then only it will respond to the discovery request. If the device is discoverable then it will respond by sharing some information such as device name, class and its unique MAC address. First time connection request automatically presented to the user. The information can be read using the Bluetooth APIs. 4.1.3 Initialization process Module Bilinear pairing is a main component in constructing our tripartite protocol. Firstly briefly review some basic facts of bilinear pairing. Let be an additive group with order q and be a multiplicative group. Given P is a generator of assume discrete logarithm problem (DLP) is hard in i.e., given the instance p, it is difficult to calculate a. To say a mapping function e is bilinear if satisfies the following properties: Bilinearity: ( ) ( ) for all and . Also for ( ) ( ) ( ) and ( ) ( ) ( ) Non-degeneracy: ( ) is the generator of if P is the generator of . In other words, ( ) Computable: There exist an efficient algorithm to compute ( ) Next, state some famous hard problems related to bilinear pairings and elliptic curves. Computational Diffie-Hellman Problem (CDH): The CDH problem states that given two elements and a generator P in as inputs where output abP. An algorithm has advantage in solving CDH if * ( ) + Where the probability is over the random choice of generator the random choice of and the random bits consumed by .CDH assumption: To say that the ( ) assumption
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 725` holds in if no t-time algorithm has an advantage more than ϵin solving CDH problem in .Bilinear Diffie-Hellman Problem (BDH): The BDH problem states that given three elements , a generator P in and a bilinear pairing function as inputs, where output ( ) . An algorithm has advantage in solving BDH if ( ( ) ( ) + Where the probability is over the random choice of generator the random choice of and the random bits consumed by . BDH assumption: To say that the ( ) holds in to if no algorithm has an advantage more than in solving BDH problem using bilinear map . 4.1.4 Bipartite Authentication Protocol Module Present the bipartite authentication protocol using encryptions E and MACs M. Assume there are two handheld devices A and B want to authenticate each other such that A is equipped with a high resolution display and B is equipped with a camera. A initiates the protocol by randomly selecting an integer calculating and generating two k-bits long random keys and . Then, A calculates and sends the following tuples to B. ( ) ( ( ) ( ) ) At the same time, it encodes and into a visual code and displays it on screen. Note that is encrypted; thus, the adversary cannot forge valid MAC value and further launch MITM attack. After receiving the tuples above, B takes a photograph of the visual code with its screen to obtain the key ̂ and ̂ . Then, it verifies the tuples using ̂ and decrypts using ̂ to obtain ̂ . If the message is authenticated, B will consider A is a trusted device. Otherwise, it will terminate the process. B also selects a random integer and calculates After that, it computes ( ̂ ). Finally, it prepares the following tuples and sends them to A. ( ) ( ) ) After receiving the tuples from B,A computes ̂ ( ). Then, A verifies if ̂ ( ) If it does, A will authenticate B as a trusted device. Each of them will utilize a l-bit key ( ̂ ) ( ̂ ) as their session key for further communication. The completeness of the protocol is asserted by assuming there is no adversary in the environment. Notice that ( ̂ ) ( ̂ ). Therefore A and B will be mutually authenticated if the tuples they send are unaltered. 4.2 Advantages of the Proposed System  Insider attack is detected  High efficient  High secure
  • 7. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 726` Fig 2.1 System Architecture Diagram V. CONCLUSION Agreeing key in ad-hoc environment securely is an important topic. Most of the previous schemes only focus on two parties’ case and are overcomplicated. In this work the efficient key agreement protocols are developed for two and three handheld devices over temporal confidential and authenticated channels. Create the tuples by one device Generate the random keys Encodes the keys into visual codes and displays on the screen Scalable authentication protocol Trust score based method Receives the tuples by another device Verify the tuples Bipartite authentication Multipartite authenticatio n Tripartite authentication Compute the trust score for the nodes Update the trust values Detect the attacks Analyze the behavior Performance comparison Mobile
  • 8. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 727` They simplify previous unnecessary complications and reduce the bottleneck of running time – human’s involvements. This system enjoys several nice properties including efficient, human error proof, and secure. By satisfying the above practical requirements, these protocols have improved previous scheme significantly. But the insider attacks are not detected in this method. REFERENCES [1] Apkun S.C, Hubaux .J, and Buttya´n .C, “Mobility helps security in ad hoc networks,” in Proc. of the 4th ACM Symposium on Mobile ad hoc Networking & Computing, 2011, pp. 46–56. [2] Barua .R, Dutta .R, and Sarkar .P, “Extending Joux’s protocol to multi party key agreement,” in Progress in Cryptology–INDOCRYPT, 2003, pp. 205–217. [3] Balfanz .D, Smetters .D, Stewart .P, and Wong .H, “Talking to strangers: Authentication in ad-hoc wireless networks,” in Proc. of the 9th Symposium on Network and Distributed System Security Symposium [4] Blake-Wilson .S and Menezes .A,“Entity authentication and authenticated key transport protocols employing asymmetric techniques,” Security Protocols Workshop, vol. 97, 1997. [5] Bellare .M and Rogaway .P, “Entity authentication and key distribution,” in Proc. of the Advances in Cryptology- CRYPTO, vol. 773, 1993, pp. 232–249. [6] Boyko .V, MacKenzie .P, and Patel .S, “Provably Secure Password- Authenticated Key Exchange Using Diffie- Heilman,” Proceedings of the Advances in Cryptology-Eurocrypt, 2009 [7] Bellovin S.M, and Merritt.M, “Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise,” in Proc. 1st ACM conf. on Computer and Communications Security, pp. 244–250. [8] Gehrmann .C, Mitchell .C, and Nyberg .K, “Manual authentication for wireless devices,” RSA Cryptobytes, vol. 7, no. 1, pp. 29–37, 2004 [9] Bluetooth .S, “The official Bluetooth wireless info site,” 2011. [10] Chen et al., “GAnGS: Gather, authenticate ’n group securely,” in Proc. of the 4th ACM Inter. Conf. on Mobile Computing and Networking. ACM New York, NY, USA, pp. 92–103.