Secure Constructing Bluetooth Scatternet Based on BTCP

A Bluetooth ad hoc network can be formed by interconnecting piconets. The security of the process of Bluetooth scatternet formation is a major factor to guarantee the applications of Bluetooth network. Through the analysis of the characteristics of Bluetooth scatternet formation algorithm and Bluetooth's security architecture, this paper gives out a scheme for Bluetooth scatternet security based on BTCP. It can defeat man-in-the-middle attack and achieve authentication in the process of forming a scatternet.

[1]  Leandros Tassiulas,et al.  Distributed topology construction of Bluetooth personal area networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[2]  Kai-Yeung Siu,et al.  A New Bluetooth Scatternet Formation Protocol , 2003, Mob. Networks Appl..

[3]  Imrich Chlamtac,et al.  Bluetrees-scatternet formation to enable Bluetooth-based ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[4]  Kai-Yeung Siu,et al.  A Bluetooth scatternet formation algorithm , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[5]  Stefano Basagni,et al.  Multihop scatternet formation for Bluetooth networks , 2002, Vehicular Technology Conference. IEEE 55th Vehicular Technology Conference. VTC Spring 2002 (Cat. No.02CH37367).

[6]  Matthias Frank,et al.  Bluetooth scatternets: an enhanced adaptive scheduling scheme , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.