A bypassing security model for anonymous bluetooth peers

Hahnsang Kim, Walid Dabbous, Hossam Afifi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Bluetooth technology provides conveniences ranging from simply substituting for wires of electrical household products to constructing home network systems. Providing Bluetooth-technology-based services in public raises security issues in providing a secure Bluetooth link for unknown Bluetooth peers. In this paper, we present a bypassing security model for protecting communications between anonymous Bluetooth peers via wireless local area network (WLAN) and authentication authorization and accounting (AAA) technologies. Our bypassing security model is composed of the Bluetooth peer authentication, the Bluetooth key negotiation, and the link key generation. It brings a cost-effective realization in conjunction with standard technologies and is suitable for large-scale service providing systems by relying on the infrastructure network. In contrast to a certificate-based Diffie-Hellman method that requires computation-intensive cryptographic functions, our model performs faster on power-limited devices.

Original languageEnglish
Title of host publication2005 International Conference on Wireless Networks, Communications and Mobile Computing
Pages310-315
Number of pages6
DOIs
Publication statusPublished - 1 Dec 2005
Externally publishedYes
Event2005 International Conference on Wireless Networks, Communications and Mobile Computing - Maui, HI, United States
Duration: 13 Jun 200516 Jun 2005

Publication series

Name2005 International Conference on Wireless Networks, Communications and Mobile Computing
Volume1

Conference

Conference2005 International Conference on Wireless Networks, Communications and Mobile Computing
Country/TerritoryUnited States
CityMaui, HI
Period13/06/0516/06/05

Fingerprint

Dive into the research topics of 'A bypassing security model for anonymous bluetooth peers'. Together they form a unique fingerprint.

Cite this