A secure protocol for bluetooth piconets using elliptic curve cryptography

MS Hwang, CC Lee, JZ Lee, CC Yang - Telecommunication systems, 2005 - Springer
In this article, the authors shall propose a new method for the implementation of secure
Bluetooth piconets. Two requirements for the systems must be considered, ie, privacy and …

[PDF][PDF] A trusted device to secure a Bluetooth PicoNet

L Rousseau, C Arnoux, C Cardonnel - Published in Proc. of Gemplus …, 2001 - Citeseer
Bluetooth [6] is a wireless protocol used for short-range communications. The Bluetooth
devices talking to each other form a piconet. A piconet is composed of one master device …

An new secure mechanism for bluetooth network

K Saravanan, D Yuvaraj - 2010 the 2nd international …, 2010 - ieeexplore.ieee.org
Communication of any mode in the modern days is effective only the nodes in the network
should be completely away from physical connection in the form of wireless manner …

Research and design of one key agreement scheme in bluetooth

B Yu, H Li - … International Conference on Computer Science and …, 2008 - ieeexplore.ieee.org
Since there is eavesdropping and MITM attack during establishing encryption key between
two Bluetooth devices, a secure key agreement scheme is designed based on elliptic curves …

[图书][B] Introduction to bluetooth

L Harte - 2009 - dl.acm.org
This book provides a simplified description of Bluetooth technology, services, and profiles.
You will find out how Bluetooth devices automatically locate nearby Bluetooth devices …

Bluetooth network security: A new approach to secure scatternet formation

SS Liong, PM Barnaghi - TENCON 2005-2005 IEEE Region 10 …, 2005 - ieeexplore.ieee.org
In this paper, we study some of the most common formation protocols for scatternets such as
BlueTrees, BlueNet, and BlueStars. The paper focuses on security mechanisms that are …

[PDF][PDF] A review on security mechanism of Bluetooth communication

T Panse, V Kapoor - International Journal of Computer Science and …, 2012 - academia.edu
In this article we present a survey on security mechanism used in Bluetooth communication.
Bluetooth is the personal area network (PAN). It is the kind of wireless Ad hoc network. Low …

[PDF][PDF] A design approach for wireless communication security in bluetooth network

BK Mandal, D Bhattacharyya, T Kim - International Journal of …, 2014 - academia.edu
Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become
a popular way of wireless interconnections for exchanging information. Bluetooth technology …

A secure authentication scheme for bluetooth connection

AS Diallo, WFM Al-Khateeb… - … on Computer and …, 2014 - ieeexplore.ieee.org
Recently, Bluetooth technology is widely used by organizations and individuals to provide
wireless personal area network (WPAN) because the radio frequency (RF) waves can easily …

Hardware implementation of Bluetooth security

P Kitsos, N Sklavos, K Papadomanolakis… - IEEE Pervasive …, 2003 - ieeexplore.ieee.org
Bluetooth can implement its security layer's key-generation mechanism and authentication
in software or hardware. Software implementation usually satisfies user requirements, but in …