The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A Bluetooth ad hoc network can be formed by interconnecting piconets. The security of the process of Bluetooth scatternet formation is a major factor to guarantee the applications of Bluetooth network. Through the analysis of the characteristics of Bluetooth scatternet formation algorithm and Bluetooth's security architecture, this paper gives out a scheme for Bluetooth scatternet security based on...
Through the analysis of the characteristics of Bluetooth piconet and Bluetooth's security architecture, this paper gives out a scheme of group key agreement based on Diffie-Hellman key agreement protocol. It affords a method that nodes can authenticate each other in the Bluetooth piconet and defeat threats derived from Bluetooth link-level. In the last place, the feasibility of the scheme is verified.
Through the analysis and research of Bluetooth's security architecture, in this paper it gives out the security architecture based on user authentication and block cipher that is not provided natively by Bluetooth. It can defeat threats of only adopted Bluetooth link-level authentication and E0 stream cipher.
Since there is eavesdropping and MITM attack during establishing encryption key between two Bluetooth devices, a secure key agreement scheme is designed based on elliptic curves cryptography and interlock protocol. This scheme can defend two kinds of attacks mentioned above. It provides bidirectional authentication for two devices and key integrity verification by exchanging the keyspsila Hash-value...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.