Abstract
In accordance with the changes in the wireless communication environment, there has been a great need to satisfy the demand for diverse modes of information exchange. However, Bluetooth has weaknesses in its security features when its in-house security services are applied to networks. The purpose of this study is to propose a secure Bluetooth scenario with an upgraded security feature. This paper first reviews the general characteristics and security features of Bluetooth together with an analysis of its weaknesses, and presents the formation and maintenance process of Bluetooth piconet with is created by using ECDSA and group key in the ACL (Asynchronous Connection-less Link) connection through a secure Bluetooth inquiry process.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
http://www.bluetooth.com (Bluetooth White Paper)
http://www.bluetooth.org/specifications.htm (Bluetooth v1.1 Core Specifications)
http://www.niksula.cs.hut.fi/~jiitv/bluesec.html (JuhaT. Bluetooth security)
http://www.cs.hut.fi/Opinnot/Tik-86.174/sectopics.html (Ullgren T. Security in Bluetooth: Key management in Bluetooth)
http://www.bell-labs.com/usermarkusj/bt.html (Jakobsson M., Wetzel S. Security Weakness in Bluetooth: RSA 2001)
E. Hughes, “An Encrypted Key Transmission Protocol,” presented at the rump session of CRYPTO’ 94, Aug 1994.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Seo, DH., Lee, IY., Oh, Di., Park, Ds. (2002). Secure Bluetooth Piconet Using Non-anonymous Group Key. In: Shafazand, H., Tjoa, A.M. (eds) EurAsia-ICT 2002: Information and Communication Technology. EurAsia-ICT 2002. Lecture Notes in Computer Science, vol 2510. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36087-5_89
Download citation
DOI: https://doi.org/10.1007/3-540-36087-5_89
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00028-0
Online ISBN: 978-3-540-36087-2
eBook Packages: Springer Book Archive