Skip to main content

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 281))

Included in the following conference series:

  • 1416 Accesses

Abstract

Bluetooth is short range wireless communication mechanism that provides detail specifications for connecting devices. It is used for data transfer over wireless channel however, the functionality is not just limited to this. It provides advanced features that has no alternative in current time that includes low cost, low power, faster data rates and sharing services like Internet, personal area networking etc. Provided with high-end features, Bluetooth requires adequate security implementations for secure and reliable communication. Current security implementations for authentication and encryption are claimed strong enough against security threats. Authorization currently supported by Bluetooth is however, based on simple allowing or denying a resource. Authorization should facilitate user with fine grained control features over resources. This means that authorization mechanism should provide usage control over resources shared using Bluetooth. We propose Bluetooth Usage Control Model (BUCM) that enhances existing security model in usage control features. Using extended model, user can perform fine grain customization of resources. Proposed model is implemented within Android Bluetooth stack. Performance results verify the extended model for minimal overhead in performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albrecht, M., Frank, M., Martini, P., Schetelig, M., Vilavaara, A., Wenzel, A.: Inst. of Comput. Sci. IV, Bonn Univ.: IP services over Bluetooth: leading the way to a new mobility. In: Local Computer Networks, LCN 1999 Conference (1999)

    Google Scholar 

  2. Limitations of Android emulator.: Using the Android Emulator, http://developer.android.com/guide/developing/devices/emulator.html

  3. Nguyen, L., Safavi-Naini, R., Susilo, W., Wysocki, T.: Centre for Comput. Security Res. In: 10th IEEE International Conference on Secure Authorization, Access Control and Data Integrity in Bluetooth, ICON 2002, pp. 428–433. Wollongong Univ., Australia (2002) ISSN: Print ISBN: 0-7803-7533-5

    Google Scholar 

  4. Kim, J., Kim, J., Lim, Y., Yoon, J., Min, S.L., Ma, J.S.: A Bluetooth-based high-performance LAN access point incorporating multiple radio units. In: Proc. Int. Conf. on Comm. in Computing CIC, Las Vegas (2001)

    Google Scholar 

  5. Nauman, M., Khan, S.: Design and Implementation of a Fine-grained Resource Usage Model for the Android Platform. The International Arab Journal of Information Technology 8(4) (October 2011)

    Google Scholar 

  6. Scarfone, K., Padgette, J.: Guide to Bluetooth security Special publication 800-121. National Institute of Science & Technology US Department of Commerce

    Google Scholar 

  7. Bluetooth Tutorial - Profiles.: Profiles Table of Contents, http://www.palowireless.com/infotooth/tutorial/profiles.asp

  8. Bluetooth PAN profile.: Personal Area Networking Profile, grouper.ieee.org/groups/802/15/Bluetooth/PAN-Profile.pdf

  9. Nicolas Rouhana University, Nicolas Rouhana.: Bluetooth Web Internet Gateway (2002), http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.4024

  10. Lim, Y., Kim, J., Min, S.L., Ma, J.S.: Dept. of Mech. Eng., Seoul Univ. Performance evaluation of the Bluetooth-based public Internet access point. In: Proceedings of 15th International Conference on Information Networking (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Khan, S., Babar, I. (2012). Bluetooth Usage Control Policy Enforcement Model. In: Chowdhry, B.S., Shaikh, F.K., Hussain, D.M.A., Uqaili, M.A. (eds) Emerging Trends and Applications in Information Communication Technologies. IMTIC 2012. Communications in Computer and Information Science, vol 281. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28962-0_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28962-0_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28961-3

  • Online ISBN: 978-3-642-28962-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics