scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Enhancing security in Bluetooth networks

01 Nov 2014-pp 1-3
TL;DR: In this paper, an enhanced security framework is developed for Bluetooth based networks and a Security controller is proposed on top of the Link Layer of the Bluetooth Stack for message authentication and integrity in the scatternet scenario.
Abstract: Bluetooth is the widely used technology for the short range communication Security has become a major concern in the usage of Bluetooth In this paper, an enhanced security framework is developed for Bluetooth based networks A Security controller is proposed on top of the Link Layer of the Bluetooth Stack for message authentication and integrity in the scatternet scenario As NS2 has no provision for security protocols, a newalgorithm is written especially for the security purpose and added to the NS2 package The Security algorithm used is Modified RSA (Rivest-Shamir-Adleman) for providing digital signature, encryption and decryption The simulation shows how the data transfer takes place between the nodes in the Bluetooth network scenario with the implementation of the added security protocol
Citations
More filters
Journal ArticleDOI
25 Jun 2020-Sensors
TL;DR: A comparative survey of IDS approaches for related low-power wireless protocols was used to map out potential approaches for enhancing IDS solutions for BLE Mesh networks, showing that the implementation of BLE pure mesh protocols remains an open research issue.
Abstract: Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network To address these concerns, BLE version 5 enhanced existing BLE security features to deal with various authenticity, integrity, and confidentiality issues However, there is still a lack of detailed studies related to these new security features This survey examines the most recent BLE-based mesh network protocols and related security issues In the first part, the latest BLE-based mesh communication protocols are discussed The analysis shows that the implementation of BLE pure mesh protocols remains an open research issue Moreover, there is a lack of auto-configuration mechanisms in order to support bootstrapping of BLE pure mesh networks In the second part, recent BLE-related security issues and vulnerabilities are highlighted Strong Intrusion Detection Systems (IDS) are essential for detecting security breaches in order to protect against zero-day exploits Nonetheless, viable IDS solutions for BLE Mesh networks remain a nascent research area Consequently, a comparative survey of IDS approaches for related low-power wireless protocols was used to map out potential approaches for enhancing IDS solutions for BLE Mesh networks

29 citations


Cites background from "Enhancing security in Bluetooth net..."

  • ...[82] ESBN -Developed Link Layer Security Mechanism -Battle against MITM and Message Alterations...

    [...]

  • ...Priyanka and Nagajayanthi [82] developed a link-layer security mechanism for the Bluetooth stack to perform message authentication and integrity, prevent MITM attacks, and detect message alterations....

    [...]

Journal ArticleDOI
01 Oct 2019
TL;DR: To the best of the authors’ knowledge this is the first survey consolidating the work on Bluetooth multi-hop networks for classic Bluetooth technology as well as for Bluetooth Low Energy, and a synopsis of real world Bluetoothmulti-hop network deployment efforts.
Abstract: Bluetooth was firstly announced in 1998. Originally designed as cable replacement connecting devices in a point-to-point fashion its high penetration arouses interest in its ad-hoc networking potential. This ad-hoc networking potential of Bluetooth is advertised for years - but until recently no actual products were available and less than a handful of real Bluetooth multi-hop network deployments were reported. The turnaround was triggered by the release of the Bluetooth Low Energy Mesh Profile which is unquestionable a great achievement but not well suited for all use cases of multi-hop networks. This paper surveys the tremendous work done on Bluetooth multi-hop networks during the last 20 years. All aspects are discussed with demands for a real world Bluetooth multi-hop operation in mind. Relationships and side effects of different topics for a real world implementation are explained. This unique focus distinguishes this survey from existing ones. Furthermore, to the best of the authors’ knowledge this is the first survey consolidating the work on Bluetooth multi-hop networks for classic Bluetooth technology as well as for Bluetooth Low Energy. Another individual characteristic of this survey is a synopsis of real world Bluetooth multi-hop network deployment efforts. In fact, there are only four reports of a successful establishment of a Bluetooth multi-hop network with more than 30 nodes and only one of them was integrated in a real world application - namely a photovoltaic power plant.

18 citations

Proceedings ArticleDOI
21 May 2020
TL;DR: A secure model for the Bluetooth Low Energy protocol which provides application-level authentication and encryption atop the Bluetooth stack by encapsulating LoRaWAN message into the BLE payload, enabling sensitive data communication is proposed.
Abstract: The paper proposes a secure model for the Bluetooth Low Energy (BLE) protocol which provides application-level authentication and encryption atop the Bluetooth stack by encapsulating LoRaWAN message into the BLE payload, enabling sensitive data communication. In this context, the paper performs an investigation to determine the introduced transmission overhead of the applied model. Moreover, the paper studies the increase in current consumption when transmitting encapsulated payloads.

3 citations

References
More filters
Book
01 Jan 2000

254 citations

Proceedings ArticleDOI
25 Nov 2001
TL;DR: A new randomized distributed algorithm for Bluetooth scatternet formation is presented and it is proved that this algorithm achieves O(log n) time complexity and O(n) message complexity.
Abstract: A Bluetooth ad hoc network can be formed by interconnecting piconets into scatternets. The constraints and properties of Bluetooth scatternets present special challenges in forming an ad hoc network efficiently. We present and analyse a new randomized distributed algorithm for Bluetooth scatternet formation. We prove that our algorithm achieves O(log n) time complexity and O(n) message complexity. We show that: (1) in the scatternet formed by our algorithm, any device is a member of at most two piconets; (2) the number of piconets is close to being minimal.

123 citations

Journal ArticleDOI
TL;DR: New short-range wireless communication technologies would enable environment-aware, mobile, personal area networks, and an experimental wireless personal access networking platform called WiSAP, developed to research these new technologies and applications paradigms are presented.
Abstract: New short-range wireless communication technologies would enable environment-aware, mobile, personal area networks. These new technologies will serve as enablers for ubiquitous, low-cost, low-complexity, small-sized information appliances. These appliances will serve as interaction tools between humans and computer-driven services and applications existing in either the close or distant vicinity of humans. The new application paradigms these new technologies will enable are explored. Furthermore, an experimental wireless personal access networking platform called WiSAP, developed to research these new technologies and applications paradigms, is presented. Finally, some of the experiences gained from WiSAP while designing a consumer-oriented portable wireless communication system suitable for wireless mobile personal access networks are also presented.

94 citations

Proceedings ArticleDOI
05 Jan 2004
TL;DR: A new evolutionary scatternet topology construction protocol for Bluetooth networks that is close to the universal lower bound that defines the optimal number of piconets, resulting in low interference amongst pIconets.
Abstract: Wireless technologies such as 802.11 do not impose topology constraints on the network; however, Bluetooth imposes certain constraints for constructing valid topologies. The performance of Bluetooth depends largely on these topologies. This paper presents and evaluates the performance of a new evolutionary scatternet topology construction protocol for Bluetooth networks. A scatternet can be viewed as a Bluetooth ad hoc network that is formed by interconnecting piconets. The scatternets formed have the following properties: 1) the scatternets are connected, i.e. every Bluetooth device can be reached from every other device; 2) piconet size is limited to eight nodes to avoid "parking" of slaves and the associated overhead; 3) the number of piconets is close to the universal lower bound that defines the optimal number of piconets, resulting in low interference amongst piconets; and 4) end-user delay is minimized during scatternet formation. This paper also reviews existing approaches to constructing scatternet topologies and suggests extensions to the proposed scatternet formation protocol.

24 citations