Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.5.13

A Study on Scalable Bluetooth Piconet for Secure Ubiquitous  

Seo Dae-Hee (SoonChunHyang University)
Lee Im-Yeong (SoonChunHyang University)
Abstract
Due to the changes in the wireless information environment, there has been an increased demand for various types of information. Accordingly, many wireless communication technologies have been studied and developed. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new wars of using it. Thus, this research analyzed the vulnerability on the limited number of slaves in a piconet configuration through the current Bluetooth communication and proposed an expanded Bluetooth piconet formation method, regardless of the number of slaves inside the piconet even if it is not configured in a scatternet. In the proposed method, we applied a security service and resolved the vulnerabilities of the current piconet by configuring an expanded form of the current tree-shaped structure.
Keywords
Mobile communication; Bluetootht; Piconet;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Hermelin and K. Nyberg. Correlation Properties of the Bluetooth Combiner Generator. In ICISC'99, volume 1787 of LNCS. Springer Verlagg, 2000
2 http://www.niksula.cs.hut/fi/~ji itv/bluesec.html (Juha T.Vainio, 'Bluetooth Security', jssmd 2000)
3 S. Fluhrer and S. Lucks, 'Analysis of the E0 Encryption System' available from S.Lucks' web site at http://th.informatik.uni-mannheim.de/People/Lucks/papers/e0.ps.gz, agnu-zippedPost- script file
4 http://www.bluetooth.com (Bluetooth White Paper)
5 Bluetooth SIG, Specification of the Bluetooth system, Profiles', Version 1.1, February 22, 2001, available at http://www.bluetooth.com/
6 Bluetooth SIG, Specification of the Bluetooth system, Core', Version 1.1, February 22, 2001, available at http://www.bluetooth.com/
7 http://www.cs.hut.fi/Opinnot/Tik-86.174/ sectopics.html(Ullgren T, 'Security in Bluetooth Key management in Bluetooth', 2001)
8 Bluetooth Security Architecture, 1999, available at http://www.bluetooth.com/
9 http://www.bell-labs.com/user/markusj/ bt.html (Jakobsson M and Wetzel S, 'Security Weakness in Bluetooth', RSA, 2001)
10 http://mmlab.snu.ac.kr/research/publication/docs/KISS2002_jklee.pdf
11 Specification of the Bluetooth System, 1999, available at http://www.bluetooth. com/