DocumentCode :
1160723
Title :
Hardware implementation of Bluetooth security
Author :
Kitsos, Paraskevas ; Sklavos, Nicolas ; Papadomanolakis, Kyriakos ; Koufopavlou, Odysseas
Author_Institution :
Patras Univ., Greece
Volume :
2
Issue :
1
fYear :
2003
Firstpage :
21
Lastpage :
29
Abstract :
Bluetooth can implement its security layer´s key-generation mechanism and authentication in software or hardware. Software implementation usually satisfies user requirements, but in time-critical applications or processing-constrained devices, a hardware implementation is preferable.
Keywords :
Bluetooth; security of data; Bluetooth security; authentication; hardware implementation; key-generation mechanism; processing-constrained devices; software implementation; time-critical applications; user requirements; Application software; Authentication; Baseband; Bluetooth; Cryptography; Data security; Hardware; Protocols; Random number generation; Time factors;
fLanguage :
English
Journal_Title :
Pervasive Computing, IEEE
Publisher :
ieee
ISSN :
1536-1268
Type :
jour
DOI :
10.1109/MPRV.2003.1186722
Filename :
1186722
Link To Document :
بازگشت