Abstract
Bluetooth is recognized as one of the efficient way of data transmission at short distances wirelessly. Despite the fact that Bluetooth is widely accepted wireless standard for data transmission, there are also some security issues associated with Bluetooth. The pairing of Bluetooth and secure sharing of the Bluetooth pairing key is the challenge faced by the Bluetooth infrastructure today. This paper proposes the use of Out Of Band (OOB) channel for key exchange; hence proposing the use of security strengths of Global System for Mobiles (GSM) to securely communicate the encryption keys between the mobile devices, even if the users are not in the visibility range of each other. Once users accept the request to pair their devices, keys are exchanged between them and are used to set a secure communication channel between the mobile devices. The keys are exchanged via Short Message Service (SMS a service provided by GSM) and are automatically delivered to the Bluetooth pairing procedure by eliminating the need to manually communicate the Keys.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Boyko, V., MacKenzie, P.D., Patel, S.: Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156–171. Springer, Heidelberg (2000)
Alfred, K., Rahim, S., Gene, T., Ersin, U., Wang, Y.: Serial hook-ups: a comparative usability study of secure device pairing methods. In: Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS 2009) (2009)
Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proc. NDSS 2002: Network and Distributed Systems Security Symp. The Internet Society (February 2002)
Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manuall authentication for wireless devices. RSA CryptoBytes 7(1), 29–37 (2004)
Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Security Protocols Workshop (1999)
Perrig, Song, D.: Hash visualization: a new technique to improve real-world security. In: International Workshop on Cryptographic Techniques and E-Commerce (1999)
Margrave, D.: GSM Security and Encryption, http://www.hackcanada.com/blackcrawl/cell/gsm/gsm-secur/gsm-secur.html (last Accessed on September 12, 2012)
Ameen, Y.: Pakistan has the lowest SMS cost In The World: Research Report, http://www.telecomrecorder.com/2011/01/14/pakistan-has-the-lowest-sms-cost-in-the-world-research-report/ (last Accessed on May 12, 2012)
Stepanov, M.: GSM Security : Available at, Helsinki University of Technology, www.cs.huji.ac.il/~sans/students.../GSM%20Security.ppt (last Accessed on May 12, 2012)
Brute force attack, http://en.citizendium.org/wiki/Brute_force_attack/Draft (last Accessed on May 18, 2012)
SMS URL Parameters for HTTP, http://www.nowsms.com/doc/submitting-sms-messages/url-parameters (last Accessed on July 17, 2012)
Suominen, M.: GSM Security, Helsinki University of Technology, http://www.netlab.tkk.fi/opetus/s38153/k2003/Lectures/g42GSM_security.pdf (last Accessed on April 17, 2012)
Brookson, C.: GSM & PCN Security Encryption, http://www.kemt.fei.tuke.sk/predmety/KEMT414_AK/_materialy/Cvicenia/GSM/PREHLAD/gsmdoc.pdf (last Accessed on April 14, 2012)
Hwu, J.S., Hsu, S.F., Lin, Y.B., Chen, R.J.: End-to-end Security Mechanisms for SMS. International Journal of Security and Networks 1(3/4), 177–183 (2006)
Routing SMS messages to a Specific SMSC Route, http://www.nowsms.com/routing-sms-messages-to-a-specifc-smsc-route (last Accessed on February 14, 2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Aftab, S., Khalid, A., Raza, A., Abbas, H. (2013). Secure SMS Based Automatic Device Pairing Approach for Mobile Phones. In: Huang, DS., Jo, KH., Zhou, YQ., Han, K. (eds) Intelligent Computing Theories and Technology. ICIC 2013. Lecture Notes in Computer Science(), vol 7996. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39482-9_64
Download citation
DOI: https://doi.org/10.1007/978-3-642-39482-9_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39481-2
Online ISBN: 978-3-642-39482-9
eBook Packages: Computer ScienceComputer Science (R0)