Font Size: a A A

Research On Security Of Bluetooth Network

Posted on:2007-10-27Degree:DoctorType:Dissertation
Country:ChinaCandidate:G L YuFull Text:PDF
GTID:1118360212475808Subject:Military Science
Abstract/Summary:PDF Full Text Request
Application of bluetooth networks is getting wider and wider and research on bluetooth networks has already become one important direction in wireless communication technology. Security is a critical issue for potential application of bluetooth networks. But providing security in bluetooth networks is challenging due to all the characteristics of these networks, such as the vulnerability of the wireless links, the limited physical protection of each node or the dynamically changing topology. Attacks against bluetooth networks, such as PIM number attacks, address sniff, holes analysis of bluetooth protocol stack, all of them prevent application of bluetooth technology. It is very essential to resolve these attacks.In this dissertation, we investigate a series of security problems in bluetooth networks. Our contribution mainly includes three parts in the following:On network attacks and defending: upon the basis of deeply analysis of existed security architecture of bluetooth, we propose a new method to prevent PIN number attack. It adds a Hash function before the generation of initial key, which greatly increases time complexity of attacks. Our tests show that it takes a few hundreds hours for an attacker to successively get a 6-digit PIN number if using this scheme, while it only takes a few seconds for the attacker does the same thing if not using this scheme. So this scheme can prevent PIN number attacks effectively. In this part, we also give a preventive mechanism for middle-man attack in bluetooth protocol stack based on time stamp.On security of routing in bluetooth networks: Through analysis of Zaruba Blutrees forming scheme a secure network formation scheme is provided as to bluetooth tree network formation. Then, security of two typical routing protocol of bluetooth networks are analyzed, which are RMV routing vector protocol and service driving based routing protocol. By using MAC the authentication between source and destination nodes is provided. Security of service driving based routing protocol by using group cipher keys is also provided.On secure service: By producing Jini service on Bluetooth networks, we propose using Jini agen(?) to realize secure service discovery which provides authentication of two directions. A realizing model over JAAS is also given. On the query server based new secure communication...
Keywords/Search Tags:standards of bluetooth, bluetooth networks, secure routing, secure service, agent, authentication
PDF Full Text Request
Related items