By Topic

Bluetooth Network Security: A New Approach to Secure Scatternet Formation

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Liong, S.S. ; Sch. of Comput. Sci. & Inf. Technol., Nottingham Univ., Kuala Lumpur ; Barnaghi, P.M.

In this paper, we study some of the most common formation protocols for scatternets such as BlueTrees, BlueNet, and BlueStars. The paper focuses on security mechanisms that are needed to provide secure communication among the nodes in the scatternet. We propose a secure communication between two parties based on encryption mechanisms. In this approach secret keys are proposed for each pair. The focus of the suggested method is the scatternet communication security and in particular the secret key exchange. The paper describes a mechanism for the key agreement procedure through a secure scatternet formation protocol.

Published in:

TENCON 2005 2005 IEEE Region 10

Date of Conference:

21-24 Nov. 2005