Font Size: a A A

Research On Key Technologies Of Bluetooth Key Agreement For Mobile Voice Security

Posted on:2021-05-25Degree:MasterType:Thesis
Country:ChinaCandidate:B W BaoFull Text:PDF
GTID:2428330623482242Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of computer and mobile Internet technology,mobile communication network has become the most widely used communication network with the largest coverage.However,due to the open air interface and the control of the core switching network by the operator,mobile voice communication is vulnerable to eavesdropping attacks,which can not meet the requirements of the Party,government,military and other high security fields.The problems of poor compatibility and high cost of private secure communication system limit the further application of mobile voice secure communication.As an important interface of mobile terminal equipment,Bluetooth can be used for voice or data file transmission.The realization of end-toend secure communication by external Bluetooth device has the advantages of strong universality,low cost of transformation and easy management.Through the in-depth study of the data transmission process of mobile voice communication,we construct a secure communication model based on Bluetooth in combination with the demand of end-to-end secure communication.On this basis,we design a voice like modulation and demodulation scheme with error correction,an efficient authentication key agreement protocol for Bluetooth,and a key agreement data interaction protocol based on Bluetooth voice.Finally,a Bluetooth authentication key agreement prototype system for mobile communication network is implemented.Aiming at the problem of high bit error rate in data transmission of speech channel,a kind of speech like modulation and demodulation scheme with error correction is designed.On the basis of the optimal codebook,the optimal data waveform mapping is established based on the idea of simulated annealing,and the transmission reliability is further improved with BCH code.Compared with other similar schemes,this scheme significantly reduces the bit error rate of data transmission in the mobile voice channel with a small amount of storage and computing resources.Aiming at the security and efficiency of Bluetooth device key agreement,based on ECC discrete logarithm problem,an efficient authentication key agreement protocol without certificate is designed,and the security of the protocol is proved under the general security model without certificate.In this protocol,a secret value is introduced into the hash function which generates part of the private key to ensure its unforgeability,while avoiding the use of bilinear pairs to reduce the computational complexity.Compared with the same scheme,it has advantages in communication and computing cost,and is suitable for Bluetooth devices with limited resources.In view of the lack of upper layer protocol to support the data exchange of key agreement in Bluetooth voice channel,a key agreement data transmission protocol based on Bluetooth voice is proposed.Combined with the characteristics of Bluetooth voice channel and data transmission stage,the data unit of key agreement protocol is designed.On this basis,the data transmission protocol of key agreement based on Bluetooth voice is designed to ensure that Bluetooth devices can complete the data interaction of key agreement through the voice channel and can synchronously carry out the state conversion.On the basis of the above research,according to the requirements of mobile voice secure communication,the authentication key agreement prototype system based on Bluetooth voice is designed and implemented from two levels of hardware and firmware,and the key functions of the system are tested.The test results show that the prototype system can transmit data through the voice channel and execute the key agreement protocol,and the negotiation time is short and the success rate is high,which meets the design requirements.The research content of this paper is to establish a secure channel for mobile voice encryption based on Bluetooth,and expand the application of Bluetooth in the field of mobile voice security.
Keywords/Search Tags:bluetooth, mobile voice communication, Speech-like modulation and demodulation, key agreement, certificateless cryptosystem
PDF Full Text Request
Related items