TY - GEN
T1 - A bypassing security model for anonymous bluetooth peers
AU - Kim, Hahnsang
AU - Dabbous, Walid
AU - Afifi, Hossam
PY - 2005/12/1
Y1 - 2005/12/1
N2 - Bluetooth technology provides conveniences ranging from simply substituting for wires of electrical household products to constructing home network systems. Providing Bluetooth-technology-based services in public raises security issues in providing a secure Bluetooth link for unknown Bluetooth peers. In this paper, we present a bypassing security model for protecting communications between anonymous Bluetooth peers via wireless local area network (WLAN) and authentication authorization and accounting (AAA) technologies. Our bypassing security model is composed of the Bluetooth peer authentication, the Bluetooth key negotiation, and the link key generation. It brings a cost-effective realization in conjunction with standard technologies and is suitable for large-scale service providing systems by relying on the infrastructure network. In contrast to a certificate-based Diffie-Hellman method that requires computation-intensive cryptographic functions, our model performs faster on power-limited devices.
AB - Bluetooth technology provides conveniences ranging from simply substituting for wires of electrical household products to constructing home network systems. Providing Bluetooth-technology-based services in public raises security issues in providing a secure Bluetooth link for unknown Bluetooth peers. In this paper, we present a bypassing security model for protecting communications between anonymous Bluetooth peers via wireless local area network (WLAN) and authentication authorization and accounting (AAA) technologies. Our bypassing security model is composed of the Bluetooth peer authentication, the Bluetooth key negotiation, and the link key generation. It brings a cost-effective realization in conjunction with standard technologies and is suitable for large-scale service providing systems by relying on the infrastructure network. In contrast to a certificate-based Diffie-Hellman method that requires computation-intensive cryptographic functions, our model performs faster on power-limited devices.
U2 - 10.1109/WIRLES.2005.1549428
DO - 10.1109/WIRLES.2005.1549428
M3 - Conference contribution
AN - SCOPUS:34547237505
SN - 0780393058
SN - 9780780393059
T3 - 2005 International Conference on Wireless Networks, Communications and Mobile Computing
SP - 310
EP - 315
BT - 2005 International Conference on Wireless Networks, Communications and Mobile Computing
T2 - 2005 International Conference on Wireless Networks, Communications and Mobile Computing
Y2 - 13 June 2005 through 16 June 2005
ER -