skip to main content
10.1145/2984393.2984396acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesseeda-cecnsmConference Proceedingsconference-collections
research-article

On Security Provision in Demanding Cyberphysical Bluetooth based Systems

Published: 25 September 2016 Publication History

Abstract

During the last few years, short range wireless communication technologies are increasingly utilized in highly demanding applications characterized by strict performance and security demands. Among various respective communication technologies Bluetooth comprises a prominent candidate founding its way in a wide variety of commercial products. Respective implementations offer significant advantages such as low complexity, cost and power dissipation while supporting adequate performance with respect to demanding applications such as video, audio transfer and/or of high criticality such as medical oriented application scenarios. However, as security requirements increase so does the need for advanced state of the art security algorithms' implementations offering enhanced performance, resources conservations and being able to be applied in a variety of technologies. Respective requirements were highlighted in the context of ARMOR FP7 project where Bluetooth based sensors were utilized to acquire required bio-signals related to Epilepsy monitoring. This paper presents the authors' efforts and contributions in two main axes. On one hand a realistic, based on adequate research platform, performance evaluation is undertaken aiming to expose the effect of standard Bluetooth security mechanisms on network performance, as well as critical network parameters. In this context a wide range of network parameters are considered as well as security configurations. On the other hand, driven by identified Bluetooth shortcomings especially regarding security weaknesses as well as technology specific security algorithm utilized, a highly configurable as well as efficient hardware based implementation of a state-of-the-art cipher algorithm is proposed and presented.
The main objective of this effort is to present a security hardware module agnostic to the underlying technologies thus able to be easily integrated in any existing or future short wireless communication platform in order to offer a design of increased added value. Additionally, the proposed hardware module is compared to respective competition exhibiting critical advantages in all critical metrics. Summarizing this work offers valuable insights concerning the Bluetooth based platforms performance and behavior with respect to security mechanism while proposing a specific hardware design which can significantly increase security provision without comprising communication efficiency and resource expenditure.

References

[1]
Yu-Lin Tsou 2011, "Design, development and testing of a wireless sensornetwork for medical applications" 7th International Wireless Communications and Mobile Computing Conference (IWCMC), 2011. July 5-8, 2011, Istanbul, Turkey
[2]
KassemAbdallah et.al. 2009, "Real time video streaming over Bluetooth using software technique" International Conference on Advances in Computational Tools for Engineering Applications, 2009. ACTEA '09., July 15-17 2009, ZoukMosbeh, Lebanon
[3]
Lama Nachmanet. al. 2005 "The Intel® Mote platform: a Bluetooth-based sensor network for industrial monitoring" IPSN '05: Proceedings of the 4th international symposium on Information processing in sensor networks, April 2005
[4]
SomnoMedics: http://www.somnomedics.eu/home.html
[5]
AvatarEEG: http://avatareeg.com/index.html
[6]
TrackIt: http://llines.com/
[7]
EU Directive: Data Protection Directive (Directive 95/46/EC), Directive on Privacy and Electronic Communications (2002/58/EC), Directive 2011/24/EU of the European Parliament and of the Council of 9 March 2011 on the application of patients' rights in cross-border healthcare
[8]
M. RazviDoomun "Analytical Comparison of Cryptographic Techniques for Resource-Constrained Wireless Security", International Journal of Network Security, Vol. 9, No. 1, PP. 82--94, July 2009
[9]
J. Lee, et al, "The Price of Security in Wireless Sensor Networks" Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 54 Issue 17, Dec, 2010
[10]
Juan-Carlos Canoet. al. 2006, "Evaluation of the energetic impact of Bluetooth low-power modes for ubiquitous computing applications", PE-WASUN '06: Proceedings of the 3rd ACM international workshop on Performance evaluation of wireless ad hoc, sensor and ubiquitous networks, October 2006
[11]
Raffaele Bruno et. al. 2001, " Wireless access to internet via Bluetooth: performance evaluation of the EDC scheduling algorithm" WMI '01: Proceedings of the first workshop on Wireless mobile internet, July 2001
[12]
Rashid, RozehaBintiet. al. 2006, "Bluetooth Performance Analysis in Personal Area Network (PAN)", 2006 IEEE International RF and Microwave Conference (RFM), 12 Sep - 14 Sep 2006 Palm Garden Hotel, IOI Resort, Putra Jaya, Malaysia
[13]
Helion Technology. OVERVIEW DATASHEET--Ultra-low resource AES (Rijndael) cores for ASIC. Revision 2.0.1.
[14]
Jagannatha.K.B and Bhanuprakash.R, ASIC core design for low power AES, World Journal of Science and Technology 2012, 2(5):29--33 ISSN: 2231-2587
[15]
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In Proc. 6th Int. Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), pages 357--370, Boston, MA, USA, Aug. 11-13, 2004
[16]
Shimmer: http://www.shimmer-research.com/
[17]
MoviSens: http://www.movisens.com/en
[18]
Revoing2011: Revoking Networks "Advanced User Manual" Version 4.77 2/3/2011
[19]
SANS Institute InfoSec Reading Room, "Brush up on Bluetooth", 08/21/2003
[20]
Ch. Antonopoulos, A. Prayati, F. Kerasiotis, G. Papadopoulos, "CSMA-MAC Performance Evaluation for WSN Applications", 3rd International Conference on Sensor Technologies and Applications (SENSORCOMM 2009), 18-23 June, Athens/Vouliagmeni, Greece
[21]
Cadence Design Systems Inc"Leakage control needs multipronged ATTACK", http://www.eetimes.com/document.asp?doc_id=1271344
[22]
Nikolaos S. Voros, Christos P. Antonopoulos, MichalisKoutroumanidis, George K. Kostopoulos, Andreas A. Ioannides, " Introduction to ARMOR Project", Chapter Cyberphysical Systems for Epilepsy and Related Brain Disorders pp 1--10
[23]
Eric Conrad, "Advanced Encryption Standard", WhitePaper
[24]
Ch. P. Antonopoulos, Ch. Petropoulos, K. Antonopoulos, N. S. Voros, "The Effect of Symmetric Block Ciphers on WSN Performance and Behavior", Fifth IEEE International Workshop on Selected Topics in Wireless and Mobile computing (STWiMob 2012), 8--10/10, Barcelona, Spain, 2012
[25]
George Krikis, Christos P. Antonopoulos, Nikolaos S. Voros, "Design and Implementation of Efficient Reconfigurable Cipher Algorithms for Wireless Sensor Networks" 11th IEEE International Conference on Industrial Informatics, Bohum, Germany, 29--31, July, 2013
[26]
Dishongh J.T. et. al. "Wireless Sensor Networks for Healthcare Applications", ArtechHouse, 1/11/2009
[27]
Hermann F. Aalders K. Bluetooth Health Device Profile: Compatible Communication for Specialized Devices, June 2013, http://medsmagazine.com/2013/06/bluetooth-health-device-profile-compatible-communication-for-specialized-devices/
[28]
Noueihed J, et. al. "Comparing Bluetooth HDP and SPP for Mobile Health Devices, International Conference on Body Sensor Networks (BSN), Singapore, 7-9 June 2010

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SEEDA-CECNSM '16: Proceedings of the SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference
September 2016
126 pages
ISBN:9781450348102
DOI:10.1145/2984393
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 September 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Design
  2. Encryption
  3. Experimentation
  4. Implementation
  5. Performance
  6. Wireless sensor networks

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

SEEDA-CECNSM '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 62
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media