{ "id": "1901.06381", "version": "v1", "published": "2019-01-18T18:49:23.000Z", "updated": "2019-01-18T18:49:23.000Z", "title": "Smart-Lock Security Re-engineered using Cryptography and Steganography", "authors": [ "Chaitanya Bapat", "Ganesh Baleri", "Shivani Inamdar", "Anant V Nimkar" ], "comment": "Fifth International Symposium on Security in Computing and Communications (SSCC'17)", "journal": "Communications in Computer and Information Science, vol 746. Springer, Singapore (2017) pp 325-336", "doi": "10.1007/978-981-10-6898-0_27", "categories": [ "cs.CR" ], "abstract": "After the rise of E-commerce, social media and messenger bots, rapid developments have been made in the field of connecting things, gadgets, and devices, i.e, the Internet of Things (IoT). In the fast-paced lifestyle, it is very difficult to maintain multiple keys for traditional mechanical locks. Electromagnetic smart locks are a possible solution to this problem. To connect a smart lock with a key, Bluetooth Low Energy (BLE) protocol can be used. BLE protocol is vulnerable to Man-in-the-Middle (MITM) attack. Ensuring security over BLE is an ongoing challenge. This paper aims to analyze the MITM vulnerability of BLE and develop a possible solution for designing smart-locks with an increased level of security. The observation shows that the combination of Image Steganography and Cryptography helps to overcome the vulnerabilities of BLE protocol.", "revisions": [ { "version": "v1", "updated": "2019-01-18T18:49:23.000Z" } ], "analyses": { "keywords": [ "smart-lock security", "electromagnetic smart locks", "bluetooth low energy", "ble protocol", "maintain multiple keys" ], "tags": [ "journal article" ], "publication": { "publisher": "Springer" }, "note": { "typesetting": "TeX", "pages": 0, "language": "en", "license": "arXiv", "status": "editable" } } }