System Security Using Bluetooth with Remote Access  
  Authors : D.S. Adane; Anuja Fole; Megha Rajput; Ajay Kabra; Anurag Tomar

 

The traditional authentication mechanism used for a standalone or shared system is through Alphanumeric or Graphical passwords. Typical threats to passwords include Guessing, Offline Dictionary attacks, Spoofing, Shoulder Surfing and Social engineering or pretexting. Even when the Graphical passwords are used the accuracy, computational and storage overheads prohibit the use of this type of passwords, especially for low cost end user systems. We propose a technique, using Bluetooth technology on smart phones, to not only authenticate the user on a shared system, but also ensure that his / her data is safe (in encrypted form) when he / she is not accessing it. The data gets automatically decrypted when the user is within the range of the system. Another novel feature includes remote notification on system access when the user is outside the range (not in the vicinity) of the system. This feature enables the user to have total control of the system, as the user is made aware of the system access in his or her absence. We think this feature is extremely relevant for shared as well as unshared system holding sensitive data. Thus, the proposed work provides Authentication, Data Confidentiality and Remote access notification to the user working on a shared or unshared system.

 

Published In : IJCAT Journal Volume 3, Issue 5

Date of Publication : June 2016

Pages : 332-337

Figures :03

Tables : --

Publication Link :System Security Using Bluetooth with Remote Access

 

 

 

D.S. Adane : Department of Information Technology, ShriRamdeobaba College of Engineering and Management, Nagpur, India

Anuja Fole : Department of Information Technology, ShriRamdeobaba College of Engineering and Management, Nagpur, India

Megha Rajput : Department of Information Technology, ShriRamdeobaba College of Engineering and Management, Nagpur, India

Ajay Kabra : Department of Information Technology, ShriRamdeobaba College of Engineering and Management, Nagpur, India

Anurag Tomar : Department of Information Technology, ShriRamdeobaba College of Engineering and Management, Nagpur, India

 

 

 

 

 

 

 

Authentication, Confidentiality, Bluetooth, Remote Access, Encryption, Security, Shared System

The text based passwords are always vulnerable to bruteforce attack, Dictionary attack, and key loggers. Our proposed solution doesn’t use text password for authentication, rather our system uses Bluetooth address of users to authenticate them thus,eliminating all the attacks discussed above. To ensure that two legimate users don’t have access to each others directories or files, we are using Bluetooth addresses as the key for encryption thus directory contents of one user can’t be decrypted by any other user’s Bluetooth address. Systems which are shared between users of organization or family members at home need more security than personal systems, hence, using Bluetooth authentication alone isn’t sufficient thus our solution include remote administration application for owner or administrator who can control the remote system via android application that we have designed. Our system is ideal for environment where there is need of system which allows multiple user to store and retrieve data securely. The existing system can be extended by addingfunctionality like Remote Desktop sharing, file transfer and optimization of system.

 

 

 

 

 

 

 

 

 

[1] Mrs.ArunaGawde, SanchitJaina ,MohsinMasanib, SahilDeliwala“Securing Computer Device Using Bluetooth technology and One-Time Password”,International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 4 April 2015, Page No. 11426-11429. [2] A.V.Nadargi, ApurvaDalmiya, SonaliJadhav, Gajendra Singh Solanki, “Study of Securing Computer Folders with Bluetooth”, International Advanced Research Journal in Science, Engineering and Technology,Vol. 2, Issue 2, February 2015. [3] NikitaSaple, DhanrajPoojari ,AnkitaKesarkar and AlkaSrivastava , “Securing Computer Folders using Bluetooth and RijndaelEncryption”, International Journal of Current Engineering and Technology, Vol.5, No.1 (Feb 2015) [4] Wankhade S.B., Damani A.G., Desai S.J., KhanapureA.V.”An Innovative Approach to File Security Using Bluetooth International Journal of Scientific Engineering and Technology Volume No.2, Issue No.5, PP: 417-423, 1 May 2013. [5] Nishant Mishra, Vishal. Gupta.“An overview of bluetooth security: issues and challenges”, Journal of Global Research in Computer Science, Volume 3, No. 3, March 2012. [6] DhanrajPoojari, AnkitaKesarkar, Nikita Saple and AlkaSrivastava. “Improving Security for Folders in Windows by using Bluetooth and Rijndael Encryption”, International Journal of Current Engineering and Technology, Vol.5, No.2 (April 2015) [7] S. Pavithra and Mrs. E. Ramadevi.“Performance evaluation of symmetric algorithms”,Journal of Global Research in Computer Science, Volume 3, No. 8, August 2012. [8] www.aesencryption.net [9] www.bluecove.org/bluecove/apidocs/overviewsummary. html#Device Discovery