earticle

논문검색

A Design Approach for Wireless Communication Security in Bluetooth Network

초록

영어

Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular way of wireless interconnections for exchanging information. Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of personal information of user. It is the kind of wireless Ad hoc network. Low cost, low power, low complexity and robustness are the basic features of Bluetooth. It works on Radio frequency. Bluetooth communication range is categorized as high, medium and low depending upon power level. High range of Bluetooth communication is up to 91 meter, medium range is up to 9 meter and low range is up to 1 meter. Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. This article provides a study on the security issues behind the Bluetooth standard. After an overview of the general Bluetooth protocol, a security framework is introduced for the description of the Bluetooth security layout. Then both link-level and service-level security schemes are discussed in detail on the basis of the framework. Some weaknesses of the Bluetooth security strategies are analyzed, together with potential risks and possible attacks against the vulnerabilities. Corresponding countermeasures are also proposed in order to improve the Bluetooth security.

목차

Abstract
 1. Introduction
 2. Bluetooth Architecture and Protocols
  2.1. Radio Frequency (RF) Layers
  2.2. Base Band Layer
  2.3. Link 2 Manager Protocol (LMP)
  2.4. Logical Link Control and Adaptation Protocol (L2CAP)
  2.5. Radio Frequency Communication Protocol (RFCOMM)
  2.6. Service Discovery Protocol (SDP)
  2.7. Telephony Control and Signaling Layer (TCS)
  2.8. Application Layer
 3. Bluetooth Security
  3.1. Basic Definitions
  3.2. Modes of Security
  3.3. Levels of Security
 4. Link Level Security
  4.1. Key Management Scheme
  4.2. Authentication Scheme
  4.3. Encryption Scheme
 5. Security Level of Service
 6. Vulnerability
 7. Conclusion
 References

저자정보

  • Bijoy Kumar Mandal Department of Computer Science and Engineering, Faculty of Engineering and Technology, NSHM Knowledge Campus – Durgapur, Durgapur-713212, India
  • Debnath Bhattacharyya Department of Computer Science and Engineering, Faculty of Engineering and Technology, NSHM Knowledge Campus – Durgapur, Durgapur-713212, India
  • Tai-hoon Kim Department of Convergence Security, Sungshin Women's University, 249-1, Dongseon-dong 3- ga, Seoul, 136-742, Korea

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.