IPSec based bluetooth security architecture

被引:0
|
作者
Al-Hawamdeh, Al-Muthanna [1 ]
Khan, Adil [1 ]
Sikander Hayat Khiyal, M. [1 ]
机构
[1] Department of Computer Science, International Islamic University
关键词
3DES; Bluetooth; BNEP protocol; DES; IPSec; MD-5; Security; SHA-I;
D O I
10.3923/itj.2007.478.489
中图分类号
学科分类号
摘要
Bluetooth has recently obtained an unprecedented success in gaining a wide industry support. The main aim of Bluetooth is to eliminate interconnection cables and to connect one device to another via a universal radio link. First generation Bluetooth chipsets are limited in range to approximately 10 m under typical line-of-sight conditions. Future implementations will provide roughly ten times that range. In the present study, a performance assessment, processing delay and throughput of IPSec over Bluetooth based on the Bluetooth Network Encapsulation Protocol (BNEP) operation scenario, is presented. In particular, the performance of the point-to- point link and the effectiveness of IPSec (authentication and encryption) algorithms in Bluetooth. Moreover, some networking issues that may limit Bluetooth applicability in some environments will be pointed out. © 2007 Asian Network for Scientific Information.
引用
收藏
页码:478 / 489
页数:11
相关论文
共 50 条
  • [41] SDN-based automated rekey of IPsec security associations: Design and practical validations
    Parra-Espin, Jose Antonio
    Marin-Lopez, Rafael
    Lopez-Millan, Gabriel
    Pereniguez-Garcia, Fernando
    Canovas, Oscar
    COMPUTER NETWORKS, 2023, 233
  • [42] Security for the Internet of Things and the Bluetooth Protocol
    Fagua Arevalo, Rodrigo Alexander
    Salcedo Parra, Octavio Jose
    Sanchez Cespedes, Juan Manuel
    FUTURE DATA AND SECURITY ENGINEERING, FDSE 2018, 2018, 11251 : 74 - 79
  • [43] Study of security of IPsec based on IPv6 and the Diffie-Hellman algorithm
    Yang, Yao
    Liao, Jianming
    Li, JianPing
    Liu, Hui
    Hao, Yujie
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1233 - +
  • [44] Security Threats of Smart Phones and Bluetooth
    Loo, Alfred
    COMMUNICATIONS OF THE ACM, 2009, 52 (03) : 150 - 152
  • [45] Bluesniping rifle the Bluetooth security exploit
    Lamison-While, Eric
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS, 2006, : 63 - 67
  • [46] Research and Implementation of Security Wireless LANs based on EAP-TLS and IPSec VPN
    Zhou Li
    Tan Fang-yong
    Gao Xiao-hui
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 80 - 83
  • [47] An architecture enabling Bluetooth™/JINI™ interoperability
    Chau, OS
    Hui, P
    Li, VOK
    2004 IEEE 15TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 3013 - 3018
  • [48] On the Study of IPSec-Based VPN Application
    Pan, Lihong
    2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR EDUCATION (ICTE 2015), 2015, : 308 - 311
  • [49] The IPSec Security Problems and a Cross-layer Security Mechanism for PMIPv6 Handover when an IPSec Security Association is Established on an L2 Direct Link
    Leu, Fang-Yie
    Huang, Yi-Li
    Chen, Chien-Nan
    2012 SEVENTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2012), 2012, : 452 - 457
  • [50] Architecture of a Multiple Channel Blood Pressure Signal Transmitting Based on Bluetooth Technology
    He, Ruirui
    Wang, Lina
    Du, Jianqiang
    Wu, Xiaoming
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND ENGINEERING INNOVATION, 2015, 12 : 789 - 792