A New Bluetooth Security Architecture

被引:0
|
作者
Philip, Mintu [1 ]
Das, Asha [1 ]
机构
[1] Toc H Inst Sci & Technol, Arakunnam, Kerala, India
来源
TRENDS IN COMPUTER SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY | 2011年 / 204卷
关键词
cryptography; security; chaotic; logistic map;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The paper proposes a new Bluetooth security architecture based on user authentication and chaotic image encryption. The algorithm is able to overcome man in middle attack as well as privacy for image is ensured using a fast encryption algorithm based on chaotic encryption. Chaotic encryption produces the key using a pseudorandom number generator. It is a stream cipher method.
引用
收藏
页码:507 / 515
页数:9
相关论文
共 50 条
  • [1] IPSec based bluetooth security architecture
    Al-Hawamdeh, Al-Muthanna
    Khan, Adil
    Sikander Hayat Khiyal, M.
    Information Technology Journal, 2007, 6 (04) : 478 - 489
  • [2] Attacks on Bluetooth Security Architecture and Its Countermeasures
    Iqbal, Mian Muhammad Waseem
    Kausar, Firdous
    Wahla, Muhammad Arif
    INFORMATION SECURITY AND ASSURANCE, 2010, 76 : 190 - 197
  • [3] A Security Architecture Based on User Authentication of Bluetooth
    Xin, Yu
    Ting, Yan
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 627 - +
  • [4] An Architecture Design for Wireless Authentication Security in Bluetooth Network
    Mandal, Bijoy Kumar
    Bhattacharyya, Debnath
    Kim, Tai-Hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 1 - 8
  • [5] A proposal for improvement in service-level security architecture of Bluetooth
    Bandyopadhyay, S
    Majumdar, A
    Ghosh, O
    Chatterjee, S
    Chattopadhyay, S
    IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 1057 - 1061
  • [6] Bluetooth and security
    Ivo, P
    MICROWAVE AND OPTICAL TECHNOLOGY 2003, 2003, 5445 : 55 - 59
  • [7] New scheme of improving link key for Bluetooth security
    Ren, Xiu-Li
    Quan, Chengbin
    Fan, Li-Jun
    Luan, Gui-Xing
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2003, 24 (05): : 424 - 428
  • [8] Bluetooth security - an overview
    Persson, Joakim
    Smeets, Ben
    PC AI, 2000, 5 (03): : 32 - 43
  • [9] BLUETOOTH SECURITY IN THE DOD
    Padgette, John D.
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 2425 - 2430
  • [10] Security weaknesses in Bluetooth
    Jakobsson, M
    Wetzel, S
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 176 - 191