IPSec based bluetooth security architecture

被引:0
|
作者
Al-Hawamdeh, Al-Muthanna [1 ]
Khan, Adil [1 ]
Sikander Hayat Khiyal, M. [1 ]
机构
[1] Department of Computer Science, International Islamic University, Pakistan
关键词
Interconnection networks - Internet protocols - Network architecture - Security of data - Security systems;
D O I
10.3923/itj.2007.478.489
中图分类号
学科分类号
摘要
Bluetooth has recently obtained an unprecedented success in gaining a wide industry support. The main aim of Bluetooth is to eliminate interconnection cables and to connect one device to another via a universal radio link. First generation Bluetooth chipsets are limited in range to approximately 10 m under typical line-of-sight conditions. Future implementations will provide roughly ten times that range. In the present study, a performance assessment, processing delay and throughput of IPSec over Bluetooth based on the Bluetooth Network Encapsulation Protocol (BNEP) operation scenario, is presented. In particular, the performance of the point-to- point link and the effectiveness of IPSec (authentication and encryption) algorithms in Bluetooth. Moreover, some networking issues that may limit Bluetooth applicability in some environments will be pointed out. © 2007 Asian Network for Scientific Information.
引用
下载
收藏
页码:478 / 489
相关论文
共 50 条
  • [21] Augmenting Bluetooth Security by Behavior Based User Categorization
    Sandhya, S.
    Devi, Sumithra K. A.
    Paramasivam, S.
    3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 1424 - 1431
  • [22] BLUETOOTH SECURITY IN THE DOD
    Padgette, John D.
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 2425 - 2430
  • [23] Bluetooth security - an overview
    Persson, Joakim
    Smeets, Ben
    PC AI, 2000, 5 (03): : 32 - 43
  • [24] Improvements Algorithm of DES Based on Bluetooth Security Mechanism
    Yang Zhao-hui
    2011 3RD WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING (ACC 2011), VOL 2, 2011, 2 : 287 - 291
  • [25] Security weaknesses in Bluetooth
    Jakobsson, M
    Wetzel, S
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 176 - 191
  • [26] Bluetooth security moves
    Netw. Secur., 2006, 3 (19-20):
  • [27] Revisiting Bluetooth Security
    Das, Manik Lal
    Mukkamala, Ravi
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2008, 5352 : 132 - +
  • [28] LA-ANA based Architecture for Bluetooth invironment
    Sanjay, K. N.
    Shaila, K.
    Venugopal, K. R.
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 222 - 226
  • [29] Security Analysis of Bluetooth Low Energy Based Smart Wristbands
    Zhang, Qiaoyang
    Liang, Zhiyao
    2017 2ND INTERNATIONAL CONFERENCE ON FRONTIERS OF SENSORS TECHNOLOGIES (ICFST), 2017, : 421 - 425
  • [30] Research and design for IPSec architecture on kernel
    Jiang HanPing
    Jun, Yan
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 509 - +