A secure protocol for Bluetooth piconets using elliptic curve cryptography

被引:11
|
作者
Hwang, MS
Lee, CC
Lee, JZ
Yang, CC
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci, Taichung 402, Taiwan
[3] Taichung Healthcare & Management Univ, Dept Comp & Commun Engn, Taichung 413, Taiwan
关键词
authentication; Bluetooth; cryptosystems; piconet; security;
D O I
10.1007/s11235-005-1689-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this article, the authors shall propose a new method for the implementation of secure Bluetooth piconets. Two requirements for the systems must be considered, i.e., privacy and authentication. Privacy ensures that an eavesdropper cannot intercept conversations between two slaves in piconets. Authentication ensures that service is not obtained fraudulently in order to avoid charge for usage. Additionally, a new key distribution scheme is designed for practical implementation in low-cost and low-power Bluetooth piconets. The proposed method employs elliptic curve cryptography for the use in the Bluetooth network. We have proper solutions to Bluetooth devices registration and Bluetooth piconets establishment. Furthermore, compared with Seo and Lee's protocol, the proposed scheme has a lower computation cost.
引用
收藏
页码:165 / 180
页数:16
相关论文
共 50 条
  • [31] Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm
    Sudharson, K.
    Arun, S.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 1769 - 1784
  • [32] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [33] An authenticated group key transfer protocol using elliptic curve cryptography
    Priyanka Jaiswal
    Sachin Tripathi
    [J]. Peer-to-Peer Networking and Applications, 2017, 10 : 857 - 864
  • [34] Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography
    Abdelfatah, Roayat Ismail
    [J]. IEEE ACCESS, 2020, 8 : 3875 - 3890
  • [35] A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
    Kumar, Vinod
    Ahmad, Musheer
    Kumari, Adesh
    [J]. TELEMATICS AND INFORMATICS, 2019, 38 : 100 - 117
  • [36] A cancelable biometric based secure session key agreement protocol employing elliptic curve cryptography
    Arpita Sarkar
    Binod Singh
    [J]. International Journal of System Assurance Engineering and Management, 2019, 10 : 1023 - 1042
  • [37] Secure distributed power trading protocol for networked microgrids based on blockchain and elliptic curve cryptography
    Fkaier, Soumoud
    Khalgui, Mohamed
    Frey, Georg
    Li, Zhiwu
    Yu, Jiaxian
    [J]. IET SMART GRID, 2023, 6 (02) : 175 - 189
  • [38] Secure video steganographic model using framelet transform and elliptic curve cryptography
    Rout, Sonali
    Mohapatra, Ramesh Kumar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (09) : 25191 - 25212
  • [39] Efficient and secure e-voting scheme using elliptic curve cryptography
    Chatterjee, Uddalak
    Ray, Sangram
    Adhikari, Sharmistha
    Khan, Muhammad Khurram
    Dasgupta, Mou
    [J]. SECURITY AND PRIVACY, 2023, 6 (03)
  • [40] A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography
    Chuang, Yu-Hao
    Hsu, Chien-Lung
    Shu, Wesley
    Hsu, Kevin C.
    Liao, Min-Wen
    [J]. NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2015, 598 : 183 - 190