arXiv Analytics

Sign in

arXiv:1901.06381 [cs.CR]AbstractReferencesReviewsResources

Smart-Lock Security Re-engineered using Cryptography and Steganography

Chaitanya Bapat, Ganesh Baleri, Shivani Inamdar, Anant V Nimkar

Published 2019-01-18Version 1

After the rise of E-commerce, social media and messenger bots, rapid developments have been made in the field of connecting things, gadgets, and devices, i.e, the Internet of Things (IoT). In the fast-paced lifestyle, it is very difficult to maintain multiple keys for traditional mechanical locks. Electromagnetic smart locks are a possible solution to this problem. To connect a smart lock with a key, Bluetooth Low Energy (BLE) protocol can be used. BLE protocol is vulnerable to Man-in-the-Middle (MITM) attack. Ensuring security over BLE is an ongoing challenge. This paper aims to analyze the MITM vulnerability of BLE and develop a possible solution for designing smart-locks with an increased level of security. The observation shows that the combination of Image Steganography and Cryptography helps to overcome the vulnerabilities of BLE protocol.

Comments: Fifth International Symposium on Security in Computing and Communications (SSCC'17)
Journal: Communications in Computer and Information Science, vol 746. Springer, Singapore (2017) pp 325-336
Categories: cs.CR
Related articles: Most relevant | Search more
arXiv:1902.08595 [cs.CR] (Published 2019-02-22)
Penetration Tests for Bluetooth Low Energy and Zigbee using the Software-Defined Radio
arXiv:2009.11776 [cs.CR] (Published 2020-09-24)
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
arXiv:2301.03852 [cs.CR] (Published 2023-01-10)
BLE Protocol in IoT Devices and Smart Wearable Devices: Security and Privacy Threats