Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN). This is because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS). These two characteristics have led...
Saved in:
Main Authors: | Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
2014
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/39193/1/1067.pdf http://irep.iium.edu.my/39193/4/5th_international_conference_%28ICCCE_2014%29.pdf http://irep.iium.edu.my/39193/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Dual authentication for bluetooth connection
by: Saliou, Diallo Alhassane, et al.
Published: (2014) -
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014) -
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010) -
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010) -
HMAC authentication mechanisms in a grid computing environment using gridsim toolkit
by: Ismail, S. A., et al.
Published: (2015)