A Study on Scalable Bluetooth Piconet for Secure Ubiquitous
Due to the changes in the wireless information environment, there has been an increased demand for various types of information. Accordingly, many wireless communication technologies have been studied and developed. In particular, studies on ubiquitous close distance communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, this research analyzed the vulnerability on the limited number of slaves in a piconet configuration through the current Bluetooth communication and proposed an expanded Bluetooth piconet formation method, regardless of the number of slaves inside the piconet even if it is not configured in a scatternet. In the proposed method, a security service was applied and the vulnerabilities of the current piconet configured as an expanded form of the current tree-shaped structure.
KeywordsMobile systems Bluetooth piconet Group Management
Unable to display preview. Download preview PDF.
- 1.http://www.bluetooth.com (Bluetooth White Paper)
- 2.http://www.bluetooth.or.kr (Bluetooth Sepcification v1.1)
- 3.http://www.niksula.cs.hut.fi/~jiitv/bluesec.html (Juha T.Vainio, Bluetooth Security, jssmd) (2000)
- 4.jakobsson, M. and Wetzel, S.: Security Weaknesses in Bluetooth, http://www.bell-labs.com/user/markusj/bluetooth.pdf
- 5.Bluetooth Wireless Technology bridging the gap between computing and communication (February 18, 2001), http://www.intel.com/mobile/bluetooth/index.htm
- 6.Sutherland, (ed.): Despite the Hype, Bluetooth has Security Issues that cannot be ignored. November 28 (February 19, (2000), http://www.mcommercetimes.com/Technology/41
- 7.Nechvatal, J., Elaine, B., Donna, D., Morris, D., James, F., Edward, R.: Status report on the first round of the development of the advanced encryption standard. In: Computer Security Division Information Technology Laboratory, National Institute of Standards and Technology (August 1999)Google Scholar
- 8.Seo, D.-H., Lee, I.-Y., Oh, D.-I., Park, D.-S.: Bluetooth piconet using non-anonymous group key. Euraisa-ICT 2002 (2002)Google Scholar