Abstract
To resolve the problem of lacking integrality authentication on bluetooth baseband packet header, an algorithm of short message integrality authentication was designed. On the basis of the algorithm, an integrality authentication scheme of bluetooth baseband packet header was designed. The theoretical analysis and simulation results show it can guarantee the integrality of bluetooth baseband packet header with high data transmission efficiency and low computing cost.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Scarfone, K., Padgette, J.: Guide to Bluetooth Security. NIST Special Publication (2008)
Nguyen, L., Safavi-naini, R.: Secure authorization, access control and data integrity in Bluetooth. In: ICON 2002, Singapore, pp. 428–433 (2002)
Singelée, D., Preneel, B.: Security Overview of Bluetooth. COSIC Internal Report (2004)
Hämäläinen, P., Liu, N., Sterling, R., Hännikäinen, M., Hämäläinen, T.D.: Design and implementation of an enhanced security layer for bluetooth. In: ConTEL 2005, Zagreb, Croatia, pp. 575–582 (2005)
Bluetooth SIG. Specification of the bluetooth system: core package version 2.0+EDR (2004), http://www.bluetooth.org
Yu, B., Li, Y.: Design and implementation of an encryption scheme of bluetooth communication. Computer Engineering 35, 183–185 (2009)
Levi, A., Çetintaş, E., Aydos, M., Koç, Ç.K., Çağlayan, M.U.: Relay attacks on bluetooth authentication and solutions. In: Aykanat, C., Dayar, T., Körpeoğlu, İ. (eds.) ISCIS 2004. LNCS, vol. 3280, pp. 278–288. Springer, Heidelberg (2004)
Preneel, B., Govaerts, R., Vandewalle, J.: Hash functions based on block ciphers: A synthetic approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 368–378. Springer, Heidelberg (1994)
Ma, Z.H., Jia, J.: Cryptography and Network Security, p. 366. Tsinghua University Press, Beijing (2009)
Jain, R., Member, S.: A comparison of hashing schemes for address lookup in computer network. IEEE Transactions on Communications 40(3), 1570–1573 (1992)
Chen, L., Wang, G.: An integrity check method for fine-grained data. Journal of Software 20(4), 902–909 (2009)
Ren, H.P., Zhuang, Y.: One-way hash function construction based on Chen-type hyper-chaotic system and key-stream. Journal on Communications 30(10), 100–106 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, S., Liu, L., Yu, B. (2011). Integrality Authentication Scheme of Bluetooth Baseband Packet Header Based on Key Stream. In: Zhang, J. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 227. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23226-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-23226-8_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23225-1
Online ISBN: 978-3-642-23226-8
eBook Packages: Computer ScienceComputer Science (R0)