A New Bluetooth Security Architecture

被引:0
|
作者
Philip, Mintu [1 ]
Das, Asha [1 ]
机构
[1] Toc H Inst Sci & Technol, Arakunnam, Kerala, India
来源
TRENDS IN COMPUTER SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY | 2011年 / 204卷
关键词
cryptography; security; chaotic; logistic map;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The paper proposes a new Bluetooth security architecture based on user authentication and chaotic image encryption. The algorithm is able to overcome man in middle attack as well as privacy for image is ensured using a fast encryption algorithm based on chaotic encryption. Chaotic encryption produces the key using a pseudorandom number generator. It is a stream cipher method.
引用
收藏
页码:507 / 515
页数:9
相关论文
共 50 条
  • [41] Performance evaluation of INDECT security architecture
    Machnik, Petr
    Niemiec, Marcin
    Uruena, Manuel
    Stoianov, Nikolai
    REVISTA ITECKNE, 2018, 15 (01): : 34 - 42
  • [42] Architecture-Based Security or UxVs
    Berzins, Valdis
    NAVAL ENGINEERS JOURNAL, 2020, 132 (02) : 95 - 100
  • [43] Security architecture of a computing environment for eScience
    Nelson Perez, Jose
    Bolano Lopez, Fabrizio
    Rincon Mosquera, Nubia
    REVISTA CIENTIFICA, 2016, 3 (26): : 59 - 68
  • [44] Router architecture evaluation for security network
    Choi, Yungho
    Kim, Lark-Kyo
    Ahn, Hyungkeun
    Park, Neungsoo
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 628 - 635
  • [45] Towards an IPsec security GeoNet Architecture
    Sahloul, Nesrine Ayed
    Benazzouz, Lamia
    Aouini, Imen
    2012 THIRD INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2012, : 130 - 134
  • [46] Security in software architecture: A case study
    Sachitano, A
    Chapman, RO
    Hamilton, JA
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 370 - 376
  • [47] A security architecture for electronic commerce applications
    De Win, B
    Van den Bergh, J
    Matthijs, F
    De Decker, B
    Joosen, W
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 491 - 500
  • [48] An Open Architecture Framework for Safety and Security
    Bikar, Patrick
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOPS, VOLS 1 AND 2, 2009, : 557 - 561
  • [49] Research on MANET Security Architecture Design
    Li Shi-Chang
    Yang Hao-Lan
    Zhu Qing-Sheng
    2010 INTERNATIONAL CONFERENCE ON SIGNAL ACQUISITION AND PROCESSING: ICSAP 2010, PROCEEDINGS, 2010, : 90 - 93
  • [50] Router architecture evaluation for security network
    Yungho Choi
    Lark-Kyo Kim
    Hyungkeun Ahn
    Neungsoo Park
    Peer-to-Peer Networking and Applications, 2014, 7 : 628 - 635