Abstract
After the rise of E-commerce, social media and messenger bots, rapid developments have been made in the field of connecting things, gadgets, and devices, i.e., the Internet of Things (IoT). In the fast-paced lifestyle, it is very difficult to maintain multiple keys for traditional mechanical locks. Electromagnetic smart locks are a possible solution to this problem. To connect a smart lock with a key, Bluetooth Low Energy (BLE) protocol can be used. BLE protocol is vulnerable to Man-in-the-Middle (MITM) attack. Ensuring security over BLE is an ongoing challenge. This paper aims to analyze the MITM vulnerability of BLE and develop a possible solution for designing smart-locks with an increased level of security. The observation shows that the combination of Image Steganography and Cryptography helps to overcome the vulnerabilities of BLE protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gartner Says 8.4 Billion Connected. Gartner.com (2017). Accessed 8 June 2017
Gomez, C., Oller, J., Paradells, J.: Overview and evaluation of bluetooth low energy: an emerging low-power wireless technology. Sensors 12(12), 11734–11753 (2012). https://doi.org/10.3390/s120911734
Al Hosni, S.H.: Bluetooth low energy: a survey. Int. J. Comput. Appl. (0975–8887) 162(1) (2017)
Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 18(3), 2027–2051 (2016)
Green, I.: DNS spoofing by the man in the middle (2005). http://www.sans.org/rr/whitepapers/dns/1567.php
Fisher, D., et al.: New Attack Finds AES Keys Several Times Faster Than Brute Force. Threatpost — The first stop for security news (2017). Accessed 25 Jan 2017
Thiyagarajan, P., Aghila, G., Venkatesan, V.P.: Stepping up internet banking security using dynamic pattern based image steganography. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011. CCIS, vol. 193, pp. 98–112. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22726-4_12
Navale, G.S., Joshi, S.S., Deshmukh, A.A.: M-banking security a futuristic improved security approach. Int. J. Comput. Sci. Issues 7(1–2) (2010)
Hiltgen, A., Kramp, T., Weigold, T.: Secure internet banking authentication. IEEE Secur. Priv. 4(2), 21–29 (2006)
Karia, A., Patankar, A.B., Tawde, P.: SMS-based one time password vulnerabilities and safeguarding OTP over network. Int. J. Eng. Res. Technol. 3(5) (2014)
Mulliner, C., Borgaonkar, R., Stewin, P., Seifert, J.-P.: SMS-based one-time passwords: attacks and defense. In: Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. LNCS, vol. 7967, pp. 150–159. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39235-1_9
Online Safe Banking - SIM Swap - ICICI Bank. Icicibank.com (2017). Accessed 1 Apr 2017
Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices, SPSM (2011)
Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 33rd IEEE Symposium on Security and Privacy, May 2012
Juneja, M., Sandhu, P.: An improved LSB based steganography with enhanced security and embedding/extraction. In: 3rd International Conference on Intelligent Computational Systems, Hong Kong, China, January 2013
Kant, C., Nath, R., Chaudhary, S.: Biometrics security using steganography. Int. J. Secur. 2(1), 1–5 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bapat, C., Baleri, G., Inamdar, S., Nimkar, A.V. (2017). Smart-Lock Security Re-engineered Using Cryptography and Steganography. In: Thampi, S., MartÃnez Pérez, G., Westphall, C., Hu, J., Fan, C., Gómez Mármol, F. (eds) Security in Computing and Communications. SSCC 2017. Communications in Computer and Information Science, vol 746. Springer, Singapore. https://doi.org/10.1007/978-981-10-6898-0_27
Download citation
DOI: https://doi.org/10.1007/978-981-10-6898-0_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6897-3
Online ISBN: 978-981-10-6898-0
eBook Packages: Computer ScienceComputer Science (R0)