A New Bluetooth Security Architecture

被引:0
|
作者
Philip, Mintu [1 ]
Das, Asha [1 ]
机构
[1] Toc H Inst Sci & Technol, Arakunnam, Kerala, India
来源
TRENDS IN COMPUTER SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY | 2011年 / 204卷
关键词
cryptography; security; chaotic; logistic map;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The paper proposes a new Bluetooth security architecture based on user authentication and chaotic image encryption. The algorithm is able to overcome man in middle attack as well as privacy for image is ensured using a fast encryption algorithm based on chaotic encryption. Chaotic encryption produces the key using a pseudorandom number generator. It is a stream cipher method.
引用
收藏
页码:507 / 515
页数:9
相关论文
共 50 条
  • [21] Demonstrating vulnerabilities in Bluetooth security
    Hager, CT
    Midkiff, SF
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1420 - 1424
  • [22] Reserch of Bluetooth Security Manager
    Ma, K
    Cao, XY
    PROCEEDINGS OF 2003 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS & SIGNAL PROCESSING, PROCEEDINGS, VOLS 1 AND 2, 2003, : 1681 - 1684
  • [23] An analysis of Bluetooth security vulnerabilities
    Hager, CT
    Midkiff, SF
    WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1825 - 1831
  • [24] Enhancing Security In Bluetooth Networks
    Priyanka, Sharon S.
    Nagajayanthi, B.
    2014 INTERNATIONAL CONFERENCE ON SCIENCE ENGINEERING AND MANAGEMENT RESEARCH (ICSEMR), 2014,
  • [25] Bluetooth security challenges, a tutorial
    Del Vecchio, D
    El Kadhi, N
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XIII, PROCEEDINGS: INDUSTRIAL SYSTEMS, 2004, : 232 - 236
  • [26] An Investigation of Bluetooth Security Vulnerabilities
    Cope, Peter
    Campbell, Joseph
    Hayajneh, Thaier
    2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
  • [27] New security architecture for fighting terrorism?
    Timm, KJ
    KRIMINALISTIK, 2003, 57 (04): : 203 - 203
  • [28] OSCE in the "New Architecture of European Security"
    Voronkov, L.
    CONTEMPORARY EUROPE-SOVREMENNAYA EVROPA, 2018, (01): : 69 - 79
  • [29] Toward a new regional security architecture
    McMillan, J
    Sokolsky, R
    Winner, AC
    WASHINGTON QUARTERLY, 2003, 26 (03): : 161 - 175
  • [30] A new security architecture for mobile communication
    Chen Tianzhou
    Huang Yu
    Chen Feng
    Hu Wei
    PROCEEDINGS OF THE 17TH IASTED INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION, 2006, : 424 - +