Title :
Hardware implementation of Bluetooth security
Author :
Kitsos, Paraskevas ; Sklavos, Nicolas ; Papadomanolakis, Kyriakos ; Koufopavlou, Odysseas
Author_Institution :
Patras Univ., Greece
Abstract :
Bluetooth can implement its security layer´s key-generation mechanism and authentication in software or hardware. Software implementation usually satisfies user requirements, but in time-critical applications or processing-constrained devices, a hardware implementation is preferable.
Keywords :
Bluetooth; security of data; Bluetooth security; authentication; hardware implementation; key-generation mechanism; processing-constrained devices; software implementation; time-critical applications; user requirements; Application software; Authentication; Baseband; Bluetooth; Cryptography; Data security; Hardware; Protocols; Random number generation; Time factors;
Journal_Title :
Pervasive Computing, IEEE
DOI :
10.1109/MPRV.2003.1186722