A Design Approach for Wireless Communication Security in Bluetooth Network

被引:2
|
作者
Mandal, Bijoy Kumar [1 ]
Bhattacharyya, Debnath [1 ]
Kim, Tai-hoon [2 ]
机构
[1] NSHM Knowledge Campus, Fac Engn & Technol, Dept Comp Sci & Engn, Durgapur 713212, India
[2] Sungshin Womens Univ, Dept Convergence Secur, Dongseon Dong 3-ga, Seoul 136742, South Korea
关键词
Bluetooth Security; WPAN; PDA; Bluetooth Protocol; Piconet; RF; L2CAP; RFCOMM; LMP;
D O I
10.14257/ijsia.2014.8.2.35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular way of wireless interconnections for exchanging information. Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of personal information of user. It is the kind of wireless Ad hoc network. Low cost, low power, low complexity and robustness are the basic features of Bluetooth. It works on Radio frequency. Bluetooth communication range is categorized as high, medium and low depending upon power level. High range of Bluetooth communication is up to 91 meter, medium range is up to 9 meter and low range is up to 1 meter. Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. This article provides a study on the security issues behind the Bluetooth standard. After an overview of the general Bluetooth protocol, a security framework is introduced for the description of the Bluetooth security layout. Then both link-level and service-level security schemes are discussed in detail on the basis of the framework. Some weaknesses of the Bluetooth security strategies are analyzed, together with potential risks and possible attacks against the vulnerabilities. Corresponding countermeasures are also proposed in order to improve the Bluetooth security.
引用
收藏
页码:341 / 352
页数:12
相关论文
共 50 条
  • [1] An Architecture Design for Wireless Authentication Security in Bluetooth Network
    Mandal, Bijoy Kumar
    Bhattacharyya, Debnath
    Kim, Tai-Hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 1 - 8
  • [2] The Research of Bluetooth Wireless Communication Network in NC System
    Wang Kun-qi
    Wang Peng
    Wang Ya-nan
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 766 - 769
  • [3] Bluetooth in wireless communication
    Sairam, KVSSSS
    Gunasekaran, N
    Reddy, SR
    IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (06) : 90 - 96
  • [4] An implementation of wireless sensor network for security system using Bluetooth
    Choi, SH
    Kim, BK
    Park, J
    Kang, CH
    Eom, DS
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) : 236 - 244
  • [5] Review on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security
    Ghori, Muhammad Rizwan
    Wan, Tat-Chee
    Anbar, Mohammed
    Sodhy, Gian Chand
    Rizwan, Amna
    2019 17TH IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED), 2019, : 219 - 224
  • [6] Design of ECG Acquisition System Based on Bluetooth Wireless Communication
    Wang, Xiaoni
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 1019 - 1022
  • [7] The Design and Development of Wireless Communication Module Based on Bluetooth Chip
    Fu, Wei
    Tong, Shihua
    Zhang, Yachao
    Zhang, Jun
    PROCEEDINGS OF ANNUAL CONFERENCE OF CHINA INSTITUTE OF COMMUNICATIONS, 2010, : 425 - +
  • [8] A comparison of security in wireless network standards with a focus on bluetooth, WiFi and WiMAX
    Lackner, Günther
    International Journal of Network Security, 2013, 15 (06) : 420 - 436
  • [9] The Importance of Applying Security Practices in Wireless Communication: Bluetooth Low Energy and RFID
    Tassone, Joseph
    Biocchi, Mike
    PARALLEL PROCESSING LETTERS, 2018, 28 (03)
  • [10] Enhancing Security for Communication in Wireless Sensor Network
    Ramyashree, B. R.
    Aparna, R.
    COMPUTATIONAL INTELLIGENCE IN PATTERN RECOGNITION, CIPR 2020, 2020, 1120 : 295 - 302