Title :
Secure Constructing Bluetooth Scatternet Based on BTCP
Author :
Yu, Xin ; Wang, YuPing
Author_Institution :
Coll. of Autom., Beijing Union Univ., Beijing, China
Abstract :
A Bluetooth ad hoc network can be formed by interconnecting piconets. The security of the process of Bluetooth scatternet formation is a major factor to guarantee the applications of Bluetooth network. Through the analysis of the characteristics of Bluetooth scatternet formation algorithm and Bluetooth´s security architecture, this paper gives out a scheme for Bluetooth scatternet security based on BTCP. It can defeat man-in-the-middle attack and achieve authentication in the process of forming a scatternet.
Keywords :
Bluetooth; ad hoc networks; cryptographic protocols; message authentication; telecommunication network topology; telecommunication security; BTCP; Bluetooth scatternet security; Bluetooth topology construction protocol; ad hoc network; authentication; piconets; Ad hoc networks; Authentication; Bluetooth; Bridges; Educational institutions; Information security; Master-slave; Network topology; Personal area networks; Scattering; BTCP; Scatternet; authentication; man-in-the-middle attack; security;
Conference_Titel :
Information Assurance and Security, 2009. IAS '09. Fifth International Conference on
Conference_Location :
Xi´an
Print_ISBN :
978-0-7695-3744-3
DOI :
10.1109/IAS.2009.174