Title :
A bypassing security model for anonymous Bluetooth peers
Author :
Kim, Hahnsang ; Dabbous, Walid ; Afifi, Hossam
Author_Institution :
INRIA, France
Abstract :
Bluetooth technology provides conveniences ranging from simply substituting for wires of electrical household products to constructing home network systems. Providing Bluetooth-technology-based services in public raises security issues in providing a secure Bluetooth link for unknown Bluetooth peers. In this paper, we present a bypassing security model for protecting communications between anonymous Bluetooth peers via wireless local area network (WLAN) and authentication authorization and accounting (AAA) technologies. Our bypassing security model is composed of the Bluetooth peer authentication, the Bluetooth key negotiation, and the link key generation. It brings a cost-effective realization in conjunction with standard technologies and is suitable for large-scale service providing systems by relying on the infrastructure network. In contrast to a certificate-based Di0flie-Hellman method that requires computation-intensive cryptographic functions, our model performs faster on power-limited devices.
Keywords :
Bluetooth; cryptography; telecommunication security; wireless LAN; Bluetooth key negotiation; WLAN; anonymous Bluetooth peers; authentication authorization and accounting; bypassing security model; certificate-based Diffie-Hellman method; computation-intensive cryptographic functions; link key generation; wireless local area network; Authentication; Authorization; Bluetooth; Communication system security; Cryptography; Home automation; Large-scale systems; Protection; Wireless LAN; Wires;
Conference_Titel :
Wireless Networks, Communications and Mobile Computing, 2005 International Conference on
Print_ISBN :
0-7803-9305-8
DOI :
10.1109/WIRLES.2005.1549428