A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography

In this paper, the authors shall propose a new method for the implementation of secure Bluetooth piconets. Two requirements for the systems must be considered, i.e., privacy and authentication. Privacy ensures that an eavesdropper cannot intercept conversations between two slaves in piconets. Authentication ensures that service is not obtained fraudulently in order to avoid charge for usage. Additionally, a new key distribution scheme is designed for practical implementation in low-cost and low-power Bluetooth piconets. The proposed method employs elliptic curve cryptography for the use in the Bluetooth network.

Provided by: National Chung Hsing University Topic: Security Date Added: Oct 2012 Format: PDF

Find By Topic