IPSec based bluetooth security architecture

被引:0
|
作者
Al-Hawamdeh, Al-Muthanna [1 ]
Khan, Adil [1 ]
Sikander Hayat Khiyal, M. [1 ]
机构
[1] Department of Computer Science, International Islamic University
关键词
3DES; Bluetooth; BNEP protocol; DES; IPSec; MD-5; Security; SHA-I;
D O I
10.3923/itj.2007.478.489
中图分类号
学科分类号
摘要
Bluetooth has recently obtained an unprecedented success in gaining a wide industry support. The main aim of Bluetooth is to eliminate interconnection cables and to connect one device to another via a universal radio link. First generation Bluetooth chipsets are limited in range to approximately 10 m under typical line-of-sight conditions. Future implementations will provide roughly ten times that range. In the present study, a performance assessment, processing delay and throughput of IPSec over Bluetooth based on the Bluetooth Network Encapsulation Protocol (BNEP) operation scenario, is presented. In particular, the performance of the point-to- point link and the effectiveness of IPSec (authentication and encryption) algorithms in Bluetooth. Moreover, some networking issues that may limit Bluetooth applicability in some environments will be pointed out. © 2007 Asian Network for Scientific Information.
引用
收藏
页码:478 / 489
页数:11
相关论文
共 50 条
  • [21] LA-ANA based Architecture for Bluetooth invironment
    Sanjay, K. N.
    Shaila, K.
    Venugopal, K. R.
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 222 - 226
  • [22] Research and design for IPSec architecture on kernel
    Jiang HanPing
    Jun, Yan
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 509 - +
  • [23] Security Analysis of Bluetooth Low Energy Based Smart Wristbands
    Zhang, Qiaoyang
    Liang, Zhiyao
    2017 2ND INTERNATIONAL CONFERENCE ON FRONTIERS OF SENSORS TECHNOLOGIES (ICFST), 2017, : 421 - 425
  • [24] IPsec VPN-Based Security of Web-Based Rich Multimedia Systems
    Uskov, Alexander
    INTELLIGENT INTERACTIVE MULTIMEDIA SYSTEMS AND SERVICES, 2013, 254 : 31 - 40
  • [25] DEVELOPING AN ARCHITECTURE OF GAMES FOR A BLUETOOTH-BASED UBIQUITOUS ENVIRONMENT
    Miguel Rubio, Jose
    Reyes, Francisco
    Inostroza, Jorge
    WEBIST 2010: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGY, VOL 1, 2010, : 191 - 194
  • [26] Bluetooth -: Technology, security and weaknesses
    Löhlein, B
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS I, 2002, : 191 - 196
  • [27] Enhancing Security In Bluetooth Networks
    Priyanka, Sharon S.
    Nagajayanthi, B.
    2014 INTERNATIONAL CONFERENCE ON SCIENCE ENGINEERING AND MANAGEMENT RESEARCH (ICSEMR), 2014,
  • [28] Bluetooth Technology: ApXLgLevel End-to-End Security
    Rao, K. V. Bheemeswara
    Ravi, N.
    Bhushan, R. Phani
    Kumar, K. Pramod
    Venkataraman, S.
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [29] A Bluetooth-Based Architecture for Contact Tracing in Healthcare Facilities
    Di Marco, Piergiuseppe
    Park, Pangun
    Pratesi, Marco
    Santucci, Fortunato
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2021, 10 (01)
  • [30] Security for Bluetooth enabled devices using BlipTrack Bluetooth Detector
    Kumar, Monu
    Gupta, B. K.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 155 - 158