A secure protocol for Bluetooth piconets using elliptic curve cryptography

被引:11
|
作者
Hwang, MS
Lee, CC
Lee, JZ
Yang, CC
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci, Taichung 402, Taiwan
[3] Taichung Healthcare & Management Univ, Dept Comp & Commun Engn, Taichung 413, Taiwan
关键词
authentication; Bluetooth; cryptosystems; piconet; security;
D O I
10.1007/s11235-005-1689-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this article, the authors shall propose a new method for the implementation of secure Bluetooth piconets. Two requirements for the systems must be considered, i.e., privacy and authentication. Privacy ensures that an eavesdropper cannot intercept conversations between two slaves in piconets. Authentication ensures that service is not obtained fraudulently in order to avoid charge for usage. Additionally, a new key distribution scheme is designed for practical implementation in low-cost and low-power Bluetooth piconets. The proposed method employs elliptic curve cryptography for the use in the Bluetooth network. We have proper solutions to Bluetooth devices registration and Bluetooth piconets establishment. Furthermore, compared with Seo and Lee's protocol, the proposed scheme has a lower computation cost.
引用
收藏
页码:165 / 180
页数:16
相关论文
共 50 条
  • [1] A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography
    Min-Shiang Hwang
    Cheng-Chi Lee
    Ji-Zhe Lee
    Chao-Chen Yang
    [J]. Telecommunication Systems, 2005, 29 : 165 - 180
  • [2] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [3] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    [J]. WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [4] An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Ji, Zhi-Yong
    Chu, Cheng-Chen
    [J]. International Journal of Network Security, 2024, 26 (01) : 106 - 115
  • [5] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    [J]. Wireless Networks, 2019, 25 : 415 - 428
  • [6] Implementation of Bluetooth Secure Simple Pairing (SSP) using Elliptic Curve Cryptography (ECC)
    Alfarjat, Ahmad Hweishel A.
    Hanumanthappa, J.
    Hamatta, Hatem S. A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (03): : 60 - 70
  • [7] Design of Secure Group Key Agreement Protocol using Elliptic Curve Cryptography
    Jaiswal, Priyanka
    Kumar, Abhimanyu
    Tripathi, Sachin
    [J]. 2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA), 2014,
  • [8] A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    He, Debiao
    Chen, Jianhua
    Chen, Yitao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1423 - 1429
  • [9] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Jin, Chunhua
    Xu, Chunxiang
    Zhang, Xiaojun
    Zhao, Jining
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (03)
  • [10] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zezhong Zhang
    Qingqing Qi
    Neeraj Kumar
    Naveen Chilamkurti
    Hwa-Young Jeong
    [J]. Multimedia Tools and Applications, 2015, 74 : 3477 - 3488