A proposal for improvement in service-level security architecture of Bluetooth

Bluetooth is a WPAN standard that is moderately secure but still has weaknesses in its security architecture, making it vulnerable to attacks by malicious intruders. With its ever-growing popularity as a standard technology in wireless personal networks, Bluetooth security has become an increasingly important aspect. In this paper, we propose an improvement in service-level security architecture of Bluetooth that prevent 'location attack' and 'sleep deprivation torture'.

[1]  Mahmoud Naghshineh,et al.  Bluetooth: vision, goals, and architecture , 1998, MOCO.

[2]  Randy H. Katz,et al.  Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.

[3]  Michael Man-Hak Tso,et al.  Always on, always connected mobile computing , 1996, Proceedings of ICUPC - 5th International Conference on Universal Personal Communications.

[4]  Andy Hopper,et al.  Piconet: embedded mobile networking , 1997, IEEE Wirel. Commun..

[5]  Markus Jakobsson,et al.  Security Weaknesses in Bluetooth , 2001, CT-RSA.

[6]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[7]  Frank Stajano,et al.  The Resurrecting Duckling - What Next? , 2000, Security Protocols Workshop.