Advertisement

A Study on Scalable Bluetooth Piconet for Secure Ubiquitous

  • Dae-Hee Seo
  • Deok-Gyu Lee
  • Im-Yeong Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3597)

Abstract

Due to the changes in the wireless information environment, there has been an increased demand for various types of information. Accordingly, many wireless communication technologies have been studied and developed. In particular, studies on ubiquitous close distance communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, this research analyzed the vulnerability on the limited number of slaves in a piconet configuration through the current Bluetooth communication and proposed an expanded Bluetooth piconet formation method, regardless of the number of slaves inside the piconet even if it is not configured in a scatternet. In the proposed method, a security service was applied and the vulnerabilities of the current piconet configured as an expanded form of the current tree-shaped structure.

Keywords

Mobile systems Bluetooth piconet Group Management 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    http://www.bluetooth.com (Bluetooth White Paper)
  2. 2.
    http://www.bluetooth.or.kr (Bluetooth Sepcification v1.1)
  3. 3.
    http://www.niksula.cs.hut.fi/~jiitv/bluesec.html (Juha T.Vainio, Bluetooth Security, jssmd) (2000)
  4. 4.
    jakobsson, M. and Wetzel, S.: Security Weaknesses in Bluetooth, http://www.bell-labs.com/user/markusj/bluetooth.pdf
  5. 5.
    Bluetooth Wireless Technology bridging the gap between computing and communication (February 18, 2001), http://www.intel.com/mobile/bluetooth/index.htm
  6. 6.
    Sutherland, (ed.): Despite the Hype, Bluetooth has Security Issues that cannot be ignored. November 28 (February 19, (2000), http://www.mcommercetimes.com/Technology/41
  7. 7.
    Nechvatal, J., Elaine, B., Donna, D., Morris, D., James, F., Edward, R.: Status report on the first round of the development of the advanced encryption standard. In: Computer Security Division Information Technology Laboratory, National Institute of Standards and Technology (August 1999)Google Scholar
  8. 8.
    Seo, D.-H., Lee, I.-Y., Oh, D.-I., Park, D.-S.: Bluetooth piconet using non-anonymous group key. Euraisa-ICT 2002 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Dae-Hee Seo
    • 1
  • Deok-Gyu Lee
    • 1
  • Im-Yeong Lee
    • 1
  1. 1.Division of Information Technology EngineeringSoonChunHyang UniversityAsan-si, Coogchungnam-DoRepublic of Korea

Personalised recommendations