Skip to main content

Integrality Authentication Scheme of Bluetooth Baseband Packet Header Based on Key Stream

  • Conference paper
Applied Informatics and Communication (ICAIC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 227))

Included in the following conference series:

  • 1587 Accesses

Abstract

To resolve the problem of lacking integrality authentication on bluetooth baseband packet header, an algorithm of short message integrality authentication was designed. On the basis of the algorithm, an integrality authentication scheme of bluetooth baseband packet header was designed. The theoretical analysis and simulation results show it can guarantee the integrality of bluetooth baseband packet header with high data transmission efficiency and low computing cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Scarfone, K., Padgette, J.: Guide to Bluetooth Security. NIST Special Publication (2008)

    Google Scholar 

  2. Nguyen, L., Safavi-naini, R.: Secure authorization, access control and data integrity in Bluetooth. In: ICON 2002, Singapore, pp. 428–433 (2002)

    Google Scholar 

  3. Singelée, D., Preneel, B.: Security Overview of Bluetooth. COSIC Internal Report (2004)

    Google Scholar 

  4. Hämäläinen, P., Liu, N., Sterling, R., Hännikäinen, M., Hämäläinen, T.D.: Design and implementation of an enhanced security layer for bluetooth. In: ConTEL 2005, Zagreb, Croatia, pp. 575–582 (2005)

    Google Scholar 

  5. Bluetooth SIG. Specification of the bluetooth system: core package version 2.0+EDR (2004), http://www.bluetooth.org

  6. Yu, B., Li, Y.: Design and implementation of an encryption scheme of bluetooth communication. Computer Engineering 35, 183–185 (2009)

    Google Scholar 

  7. Levi, A., Çetintaş, E., Aydos, M., Koç, Ç.K., Çağlayan, M.U.: Relay attacks on bluetooth authentication and solutions. In: Aykanat, C., Dayar, T., Körpeoğlu, İ. (eds.) ISCIS 2004. LNCS, vol. 3280, pp. 278–288. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Preneel, B., Govaerts, R., Vandewalle, J.: Hash functions based on block ciphers: A synthetic approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 368–378. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  9. Ma, Z.H., Jia, J.: Cryptography and Network Security, p. 366. Tsinghua University Press, Beijing (2009)

    Google Scholar 

  10. Jain, R., Member, S.: A comparison of hashing schemes for address lookup in computer network. IEEE Transactions on Communications 40(3), 1570–1573 (1992)

    Article  Google Scholar 

  11. Chen, L., Wang, G.: An integrity check method for fine-grained data. Journal of Software 20(4), 902–909 (2009)

    Google Scholar 

  12. Ren, H.P., Zhuang, Y.: One-way hash function construction based on Chen-type hyper-chaotic system and key-stream. Journal on Communications 30(10), 100–106 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, S., Liu, L., Yu, B. (2011). Integrality Authentication Scheme of Bluetooth Baseband Packet Header Based on Key Stream. In: Zhang, J. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 227. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23226-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23226-8_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23225-1

  • Online ISBN: 978-3-642-23226-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics