The International Journal of Innovative Research in Computer and Communication Engineering
Modern vehicles are increasingly being interconnected with computer systems, which collect information both from vehicular sources and Internet services Vulnerabilities likes improper validation, exposure, and randomness. These vulnerabilities include device address validation, invalid states, and exposed keys. Man-In-The-Middle (MITM) attacks on Bluetooth Secure Simple Pairing (SSP) and other attack of falsification of information are major findings. In this paper, the author come up solution that allows a Smartphone to establish a secure session layer over an insecure radio connection, which provides additional security guarantees regardless of the security mechanisms.