Skip to main content

Wireless Bluetooth Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements

  • Conference paper
  • 1822 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6081))

Abstract

As the fast development of Bluetooth networks and wireless communications, the mobile devices share information with each other easier than ever before. However, the handy communication technology accompanies privacy and security issues. Nowadays, a Bluetooth adopts peer-to-peer and Frequency Hopping Spread Spectrum (FHSS) mechanisms to avoid data reveal, but the malicious attacks collect the transmission data of the relay station for a long period of time and then can break into the system. In this study, we take a Piconet as a cube, and transform a Scatternet into a cluster (N-cube) structure. Subsequently, this study exploits the Elliptic Curve Diffie-Hellman (ECDH) [1] and the Conference Key (CK) schemes to perform session key agreements and secure data transmissions. The proposed scheme only needs a small key length 160-bit to achieve compatible security levels on 1024-bit Diffee-Hellman (DH) [2], and each node uses few CPU, memory and bandwidth to complete security operations. As a result, the proposed fault-tolerant routing algorithm with secure data transmissions can perform rapidly and efficiently, and is quite suited for Bluetooth networks with limited resources.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Diffe, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory (November 1976)

    Google Scholar 

  2. Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of the 2008 International Conference on Information Processing in Sensor Networks, pp. 245–256 (2008)

    Google Scholar 

  3. Lee, G., Park, S.C.: Bluetooth security implementation based on software oriented hardware-software partition. In: IEEE International Conference on Communications, May 2005, pp. 2070–2074 (2005)

    Google Scholar 

  4. Hwang, T., Chen, J.L.: Indentity-Based Conference Key Broadcast System. IEE Proc.-Computer Digital Technical 141(1), 57–60 (1994)

    Article  MathSciNet  Google Scholar 

  5. Laih, C.S., Harn, L., Chang, C.C.: Contemporary Cryptography and It’s Applications, pp. 20-2–20-7. Flag Publisher (2003)

    Google Scholar 

  6. Eschenauer, L., Gligor, V.D.: A Key-management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, November 2002, pp. 41–47 (2002)

    Google Scholar 

  7. Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Chang, C.T., Chang, C.Y., Sheu, J.P.: BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems. Journal of Parallel and Distributed Computing 66(10), 1243–1258 (2006)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lin, HY., Chiang, TC. (2010). Wireless Bluetooth Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements. In: Hsu, CH., Yang, L.T., Park, J.H., Yeo, SS. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2010. Lecture Notes in Computer Science, vol 6081. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13119-6_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13119-6_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13118-9

  • Online ISBN: 978-3-642-13119-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics