Enhancing Security In Bluetooth Networks

被引:0
|
作者
Priyanka, Sharon S. [1 ]
Nagajayanthi, B. [1 ]
机构
[1] VIT Univ, SENSE, Madras, Tamil Nadu, India
关键词
Bluetooth; Scatternet; Rivest-Shamir-Adleman algorithm; NS2; Hash Function;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Bluetooth is the widely used technology for the short range communication. Security has become a major concern in the usage of Bluetooth. In this paper, an enhanced security framework is developed for Bluetooth based networks. A Security controller is proposed on top of the Link Layer of the Bluetooth Stack for message authentication and integrity in the scatternet scenario. As NS2 has no provision for security protocols, a newalgorithm is written especially for the security purpose and added to the NS2 package. The Security algorithm used is Modified RSA (Rivest-Shamir-Adleman) for providing digital signature, encryption and decryption. The simulation shows how the data transfer takes place between the nodes in the Bluetooth network scenario with the implementation of the added security protocol.
引用
收藏
页数:3
相关论文
共 50 条
  • [1] Hardware Security Threats Against Bluetooth Mesh Networks
    Adomnicai, Alexandre
    Fournier, Jacques J. A.
    Masson, Laurent
    [J]. 2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [2] Friendship Security Analysis in Bluetooth Low Energy Networks
    Lacava, Andrea
    Locatelli, Pierluigi
    Cuomo, Francesca
    [J]. 2023 21ST MEDITERRANEAN COMMUNICATION AND COMPUTER NETWORKING CONFERENCE, MEDCOMNET, 2023, : 83 - 92
  • [3] Enhancing security in wireless networks
    Koutroubinas, S
    Karoubalis, T
    Rozos, P
    Nastou, P
    Bei, P
    [J]. 2004 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, PROCEEDINGS, 2004, : 214 - 218
  • [4] ENHANCING THE SECURITY OF NETWORKS AND SYSTEMS
    PEUCKERT, H
    [J]. SIEMENS REVIEW, 1991, : 19 - 22
  • [5] Enhancing the Security of Numeric Comparison Secure Simple Pairing in Bluetooth 5.0
    Hou, Dongkun
    Zhang, Jie
    Man, Ka Lok
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1622 - 1629
  • [6] Bluetooth and security
    Ivo, P
    [J]. MICROWAVE AND OPTICAL TECHNOLOGY 2003, 2003, 5445 : 55 - 59
  • [7] Enhancing the channel utilization of asynchronous data traffic over the Bluetooth networks
    Lin, CR
    Huang, YS
    Sia, MJ
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (11) : 3255 - 3263
  • [8] Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols
    Ghori, Muhammad Rizwan
    Wan, Tat-Chee
    Sodhy, Gian Chand
    [J]. SENSORS, 2020, 20 (12) : 1 - 35
  • [9] On end-to-end security for Bluetooth/WAP & TCP/IP networks
    Sengodan, S
    Smith, D
    Abou-Rizk, M
    [J]. 2000 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2000, : 399 - 403
  • [10] BLUETOOTH SECURITY IN THE DOD
    Padgette, John D.
    [J]. MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 2425 - 2430