IPSec based bluetooth security architecture

被引:0
|
作者
Al-Hawamdeh, Al-Muthanna [1 ]
Khan, Adil [1 ]
Sikander Hayat Khiyal, M. [1 ]
机构
[1] Department of Computer Science, International Islamic University
关键词
3DES; Bluetooth; BNEP protocol; DES; IPSec; MD-5; Security; SHA-I;
D O I
10.3923/itj.2007.478.489
中图分类号
学科分类号
摘要
Bluetooth has recently obtained an unprecedented success in gaining a wide industry support. The main aim of Bluetooth is to eliminate interconnection cables and to connect one device to another via a universal radio link. First generation Bluetooth chipsets are limited in range to approximately 10 m under typical line-of-sight conditions. Future implementations will provide roughly ten times that range. In the present study, a performance assessment, processing delay and throughput of IPSec over Bluetooth based on the Bluetooth Network Encapsulation Protocol (BNEP) operation scenario, is presented. In particular, the performance of the point-to- point link and the effectiveness of IPSec (authentication and encryption) algorithms in Bluetooth. Moreover, some networking issues that may limit Bluetooth applicability in some environments will be pointed out. © 2007 Asian Network for Scientific Information.
引用
收藏
页码:478 / 489
页数:11
相关论文
共 50 条
  • [31] A security registration based on IPSec for mobile IPv6 fast handoff
    Zhao, Lei
    Li, Xiaoping
    Dong, Qingkuan
    Shi, Lei
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [32] Techniques for improving the security and manageability of IPsec policy
    Trostle J.
    Gossman B.
    International Journal of Information Security, 2005, 4 (3) : 209 - 226
  • [33] Producing Security Policy of IPSec Based on Improved λ-ID3 Algorithm
    Yang, Ming
    Guo, Shuxu
    Wang, Jun
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (01): : 19 - 26
  • [34] Research and Realization of Security Policy in IPSec Based on ID3 Algorithm
    Yang Ming
    Guo Shuxu
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 518 - 521
  • [35] IPsec/Firewall Security Policy Analysis : A Survey
    Khelf, Roumaissa
    Ghoualmi-Zine, Nacira
    2018 INTERNATIONAL CONFERENCE ON SIGNAL, IMAGE, VISION AND THEIR APPLICATIONS (SIVA), 2018,
  • [36] Impact of IPSec security on VoIP in different environments
    Kolahi, Samad S.
    Mudaliar, Keysha
    Zhang, Cheng
    Gu, Zhizhong
    2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 979 - 982
  • [37] On the (In)Security of IPsec in MAC-then-Encrypt Configurations
    Degabriele, Jean Paul
    Paterson, Kenneth G.
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 493 - 504
  • [38] Dynamic Management of IPSec Security Policies Distribution
    Sekkaki, Abderrahim
    Mustapha, El Hamzaoui
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (05): : 240 - 249
  • [39] Keypad/Bluetooth/GSM Based Digital Door Lock Security System
    Umbarkar, S.
    Rajput, G.
    Halder, S.
    Harname, P.
    Mendgudle, S.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING 2016 (ICCASP 2016), 2017, 137 : 749 - 757
  • [40] Architecture-Based Security or UxVs
    Berzins, Valdis
    NAVAL ENGINEERS JOURNAL, 2020, 132 (02) : 95 - 100