Skip to main content

Smart-Lock Security Re-engineered Using Cryptography and Steganography

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 746))

Included in the following conference series:

Abstract

After the rise of E-commerce, social media and messenger bots, rapid developments have been made in the field of connecting things, gadgets, and devices, i.e., the Internet of Things (IoT). In the fast-paced lifestyle, it is very difficult to maintain multiple keys for traditional mechanical locks. Electromagnetic smart locks are a possible solution to this problem. To connect a smart lock with a key, Bluetooth Low Energy (BLE) protocol can be used. BLE protocol is vulnerable to Man-in-the-Middle (MITM) attack. Ensuring security over BLE is an ongoing challenge. This paper aims to analyze the MITM vulnerability of BLE and develop a possible solution for designing smart-locks with an increased level of security. The observation shows that the combination of Image Steganography and Cryptography helps to overcome the vulnerabilities of BLE protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gartner Says 8.4 Billion Connected. Gartner.com (2017). Accessed 8 June 2017

    Google Scholar 

  2. Gomez, C., Oller, J., Paradells, J.: Overview and evaluation of bluetooth low energy: an emerging low-power wireless technology. Sensors 12(12), 11734–11753 (2012). https://doi.org/10.3390/s120911734

    Article  Google Scholar 

  3. Al Hosni, S.H.: Bluetooth low energy: a survey. Int. J. Comput. Appl. (0975–8887) 162(1) (2017)

    Google Scholar 

  4. Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 18(3), 2027–2051 (2016)

    Article  Google Scholar 

  5. Green, I.: DNS spoofing by the man in the middle (2005). http://www.sans.org/rr/whitepapers/dns/1567.php

  6. Fisher, D., et al.: New Attack Finds AES Keys Several Times Faster Than Brute Force. Threatpost — The first stop for security news (2017). Accessed 25 Jan 2017

    Google Scholar 

  7. Thiyagarajan, P., Aghila, G., Venkatesan, V.P.: Stepping up internet banking security using dynamic pattern based image steganography. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011. CCIS, vol. 193, pp. 98–112. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22726-4_12

    Chapter  Google Scholar 

  8. Navale, G.S., Joshi, S.S., Deshmukh, A.A.: M-banking security a futuristic improved security approach. Int. J. Comput. Sci. Issues 7(1–2) (2010)

    Google Scholar 

  9. Hiltgen, A., Kramp, T., Weigold, T.: Secure internet banking authentication. IEEE Secur. Priv. 4(2), 21–29 (2006)

    Article  Google Scholar 

  10. Karia, A., Patankar, A.B., Tawde, P.: SMS-based one time password vulnerabilities and safeguarding OTP over network. Int. J. Eng. Res. Technol. 3(5) (2014)

    Google Scholar 

  11. Mulliner, C., Borgaonkar, R., Stewin, P., Seifert, J.-P.: SMS-based one-time passwords: attacks and defense. In: Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. LNCS, vol. 7967, pp. 150–159. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39235-1_9

    Chapter  Google Scholar 

  12. Online Safe Banking - SIM Swap - ICICI Bank. Icicibank.com (2017). Accessed 1 Apr 2017

    Google Scholar 

  13. Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices, SPSM (2011)

    Google Scholar 

  14. Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 33rd IEEE Symposium on Security and Privacy, May 2012

    Google Scholar 

  15. Juneja, M., Sandhu, P.: An improved LSB based steganography with enhanced security and embedding/extraction. In: 3rd International Conference on Intelligent Computational Systems, Hong Kong, China, January 2013

    Google Scholar 

  16. Kant, C., Nath, R., Chaudhary, S.: Biometrics security using steganography. Int. J. Secur. 2(1), 1–5 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shivani Inamdar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bapat, C., Baleri, G., Inamdar, S., Nimkar, A.V. (2017). Smart-Lock Security Re-engineered Using Cryptography and Steganography. In: Thampi, S., Martínez Pérez, G., Westphall, C., Hu, J., Fan, C., Gómez Mármol, F. (eds) Security in Computing and Communications. SSCC 2017. Communications in Computer and Information Science, vol 746. Springer, Singapore. https://doi.org/10.1007/978-981-10-6898-0_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6898-0_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6897-3

  • Online ISBN: 978-981-10-6898-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics