Abstract
As the fast development of Bluetooth networks and wireless communications, the mobile devices share information with each other easier than ever before. However, the handy communication technology accompanies privacy and security issues. Nowadays, a Bluetooth adopts peer-to-peer and Frequency Hopping Spread Spectrum (FHSS) mechanisms to avoid data reveal, but the malicious attacks collect the transmission data of the relay station for a long period of time and then can break into the system. In this study, we take a Piconet as a cube, and transform a Scatternet into a cluster (N-cube) structure. Subsequently, this study exploits the Elliptic Curve Diffie-Hellman (ECDH) [1] and the Conference Key (CK) schemes to perform session key agreements and secure data transmissions. The proposed scheme only needs a small key length 160-bit to achieve compatible security levels on 1024-bit Diffee-Hellman (DH) [2], and each node uses few CPU, memory and bandwidth to complete security operations. As a result, the proposed fault-tolerant routing algorithm with secure data transmissions can perform rapidly and efficiently, and is quite suited for Bluetooth networks with limited resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Diffe, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory (November 1976)
Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of the 2008 International Conference on Information Processing in Sensor Networks, pp. 245–256 (2008)
Lee, G., Park, S.C.: Bluetooth security implementation based on software oriented hardware-software partition. In: IEEE International Conference on Communications, May 2005, pp. 2070–2074 (2005)
Hwang, T., Chen, J.L.: Indentity-Based Conference Key Broadcast System. IEE Proc.-Computer Digital Technical 141(1), 57–60 (1994)
Laih, C.S., Harn, L., Chang, C.C.: Contemporary Cryptography and It’s Applications, pp. 20-2–20-7. Flag Publisher (2003)
Eschenauer, L., Gligor, V.D.: A Key-management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, November 2002, pp. 41–47 (2002)
Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008)
Chang, C.T., Chang, C.Y., Sheu, J.P.: BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems. Journal of Parallel and Distributed Computing 66(10), 1243–1258 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lin, HY., Chiang, TC. (2010). Wireless Bluetooth Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements. In: Hsu, CH., Yang, L.T., Park, J.H., Yeo, SS. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2010. Lecture Notes in Computer Science, vol 6081. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13119-6_47
Download citation
DOI: https://doi.org/10.1007/978-3-642-13119-6_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13118-9
Online ISBN: 978-3-642-13119-6
eBook Packages: Computer ScienceComputer Science (R0)