Bluetooth Secure Simple Pairing Personal Area Network Countermeasure DOS Middle Attack

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2014 by IJETT Journal
Volume-12 Number-5
Year of Publication : 2014
Authors : Yashpal , Kr.Yashpal Sinha


Yashpal , Kr.Yashpal Sinha . "Bluetooth Secure Simple Pairing Personal Area Network Countermeasure DOS Middle Attack", International Journal of Engineering Trends and Technology (IJETT), V12(5),242-245 June 2014. ISSN:2231-5381. published by seventh sense research group


The other device to communicate with a primary option is Bluetooth devices as more types. Bluetooth technology and associated devices such companies, service attacks, man-in-the-middle attack, deny the message of revival and resource misappropriation as General wireless networking dangers, hot blood. DOS middle attack (DoSMA) between the physical layer of jam and even legal user input/output capabilities Exchange Protocol security is likely to be limited to that information sent during the fact of sending random signals by falsify is at least based on the powerful capabilities of the device type or at least safe. In addition, attacks impractical to present a proposed countermeasure. We proposed method make it in order to secure simple pairing between DOS attack (DoSMA) and authenticity, confidentiality, integrity and availability as well as receive all security requirements like this is an improvement to existing Bluetooth can withstand that much safer.


[1]. An Improved Packet size Entropy Based DoS Attack Detection Scheme (ASWANI KUMAR ) May 2013
[2]. "Cyber Security Tip ST04-015 - Understanding Denial-of-Service Attacks". United States Computer Emergency Readiness Team. Archived from the original on 2013-11-04. Retrieved December 11, 2013.
[3]. Man-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple Pairing (M Thrinatha Reddy) 2011
[4]. K. Haataja and P. Toivanen. Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures. Wireless Communications, IEEE Transactions on, 9(1):384-392, Jan. 2010.
[5]. RobotSkirts. Bluetooth keyboard attacks, Feb 2010.
[6]. Timothy K. Buennemeyer and Randy C. Marchany Michael A. Gora. Battery polling and trace determination for bluetooth attack detection in mobile devices. IEEE
[7]. Leyden, John "US credit card firm fights DDoS attack". The Register. Retrieved 2011-12-02

Introduction, Bluetooth (SSP) DoS middle Attacks / Threats and Overview, Motivation and Objective