Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3597))

Included in the following conference series:

  • 702 Accesses

Abstract

Due to the changes in the wireless information environment, there has been an increased demand for various types of information. Accordingly, many wireless communication technologies have been studied and developed. In particular, studies on ubiquitous close distance communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, this research analyzed the vulnerability on the limited number of slaves in a piconet configuration through the current Bluetooth communication and proposed an expanded Bluetooth piconet formation method, regardless of the number of slaves inside the piconet even if it is not configured in a scatternet. In the proposed method, a security service was applied and the vulnerabilities of the current piconet configured as an expanded form of the current tree-shaped structure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.bluetooth.com (Bluetooth White Paper)

  2. http://www.bluetooth.or.kr (Bluetooth Sepcification v1.1)

  3. http://www.niksula.cs.hut.fi/~jiitv/bluesec.html (Juha T.Vainio, Bluetooth Security, jssmd) (2000)

  4. jakobsson, M. and Wetzel, S.: Security Weaknesses in Bluetooth, http://www.bell-labs.com/user/markusj/bluetooth.pdf

  5. Bluetooth Wireless Technology bridging the gap between computing and communication (February 18, 2001), http://www.intel.com/mobile/bluetooth/index.htm

  6. Sutherland, (ed.): Despite the Hype, Bluetooth has Security Issues that cannot be ignored. November 28 (February 19, (2000), http://www.mcommercetimes.com/Technology/41

  7. Nechvatal, J., Elaine, B., Donna, D., Morris, D., James, F., Edward, R.: Status report on the first round of the development of the advanced encryption standard. In: Computer Security Division Information Technology Laboratory, National Institute of Standards and Technology (August 1999)

    Google Scholar 

  8. Seo, D.-H., Lee, I.-Y., Oh, D.-I., Park, D.-S.: Bluetooth piconet using non-anonymous group key. Euraisa-ICT 2002 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seo, DH., Lee, DG., Lee, IY. (2005). A Study on Scalable Bluetooth Piconet for Secure Ubiquitous. In: Shimojo, S., Ichii, S., Ling, TW., Song, KH. (eds) Web and Communication Technologies and Internet-Related Social Issues - HSI 2005. HSI 2005. Lecture Notes in Computer Science, vol 3597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527725_6

Download citation

  • DOI: https://doi.org/10.1007/11527725_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27830-6

  • Online ISBN: 978-3-540-31808-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics