Abstract
Due to the changes in the wireless information environment, there has been an increased demand for various types of information. Accordingly, many wireless communication technologies have been studied and developed. In particular, studies on ubiquitous close distance communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, this research analyzed the vulnerability on the limited number of slaves in a piconet configuration through the current Bluetooth communication and proposed an expanded Bluetooth piconet formation method, regardless of the number of slaves inside the piconet even if it is not configured in a scatternet. In the proposed method, a security service was applied and the vulnerabilities of the current piconet configured as an expanded form of the current tree-shaped structure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
http://www.bluetooth.com (Bluetooth White Paper)
http://www.bluetooth.or.kr (Bluetooth Sepcification v1.1)
http://www.niksula.cs.hut.fi/~jiitv/bluesec.html (Juha T.Vainio, Bluetooth Security, jssmd) (2000)
jakobsson, M. and Wetzel, S.: Security Weaknesses in Bluetooth, http://www.bell-labs.com/user/markusj/bluetooth.pdf
Bluetooth Wireless Technology bridging the gap between computing and communication (February 18, 2001), http://www.intel.com/mobile/bluetooth/index.htm
Sutherland, (ed.): Despite the Hype, Bluetooth has Security Issues that cannot be ignored. November 28 (February 19, (2000), http://www.mcommercetimes.com/Technology/41
Nechvatal, J., Elaine, B., Donna, D., Morris, D., James, F., Edward, R.: Status report on the first round of the development of the advanced encryption standard. In: Computer Security Division Information Technology Laboratory, National Institute of Standards and Technology (August 1999)
Seo, D.-H., Lee, I.-Y., Oh, D.-I., Park, D.-S.: Bluetooth piconet using non-anonymous group key. Euraisa-ICT 2002 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Seo, DH., Lee, DG., Lee, IY. (2005). A Study on Scalable Bluetooth Piconet for Secure Ubiquitous. In: Shimojo, S., Ichii, S., Ling, TW., Song, KH. (eds) Web and Communication Technologies and Internet-Related Social Issues - HSI 2005. HSI 2005. Lecture Notes in Computer Science, vol 3597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527725_6
Download citation
DOI: https://doi.org/10.1007/11527725_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-27830-6
Online ISBN: 978-3-540-31808-8
eBook Packages: Computer ScienceComputer Science (R0)