International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 02 | Feb -2017
www.irjet.net
e-ISSN: 2395 -0056 p-ISSN: 2395-0072
Analysis of Lightweight Security Protocol for Bluetooth Communication with ECC Approach SAIYED FAIAYAZ WARIS Department of Computer,Mizan Tepi University, Ethiopia --------------------------------------------------------------****-------------------------------------------------------------------Abstract possible to form different networks in the same Algorithm is proposed to transfer data more geographical point, with relatively high speed of securely along Bluetooth channel. To transfer transmission. data confidentially between paired devices a 128In section II is about Bluetooth technology bit stream cipher algorithm E0 is used in pairing and encryption algorithms. Section III we Bluetooth communication .E0 is vulnerable to discussed about vulnerabilities in present certain types of security attacks. Vulnerabilities algorithm and section. IV discussed proposed present in E0 and conditions are discussed. algorithm and comparative study. Bluetooth is Proposed algorithm use AES for data encryption, an open standard for short-range radio which can be used as block cipher [E0 works in frequency (RF) communication. Bluetooth stream ciphering mode].The keys used in AES is technology is generally used to transfer data, encrypted using elliptic curve cryptography [ECC], establish connection in peer to peer [p2p] most secure and fast algorithm use small size keys. networks. It is almost unfeasible to attempt a brute force Bluetooth technology has been integrated to attack to break the cryptosystem using ECC. many devices but mainly in mobile terminals like Keywords -AES; EC, Bluetooth, E0; laptops, palmtops and mobile phones [2]. I. INTRODUCTION Bluetooth technology is short range, low power wireless communication technology. Bluetooth is designed to replace cables via wireless communication. Bluetooth is able to communicate in short range of 30m and with a decent data rate of about 1mbps. Bluetooth is mainly used for communication between mobile devices and also in application we need small data rate and consume low power, Now a days Bluetooth is also used in wireless sensor networks due to its low power consumption property. Bluetooth is an open system so it can have some security risks. Nowadays a lot of mobile phones and other different devices include Bluetooth and in some cases the people who buy those devices don´t now even that the Bluetooth system is operating.
This allows users to form ad hoc networks, Piconets between a wide variety of devices to transfer voice and data. Bluetooth technology and associated devices are susceptible to general wireless networking threats, such as denial of service attacks, eavesdropping, man-in-theMiddle attacks, message modification, and resource misappropriation [1]. Attacks against improperly secured Bluetooth implementations can provide attackers with unauthorized access to sensitive information and unauthorized usage of Bluetooth devices and other systems or networks to which the devices are connected. The Bluetooth technology use a stream cipher E0, E0 is vulnerable to certain types of attacks and some cases cracked by 0(264).In those application where data confidentiality is most important E0 is not a good option. In E0 a key stream output is exclusively or-ed with payload bits and sent to the receiving device [4]. This key stream is produced using a cryptographic
One of the biggest attractions of the implementation of this technology is the creation of networks with the Bluetooth technology is Š 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 2035