GROUP KEY APPLICATIONS IN BLUETOOTH PICONET

Bluetooth is a wireless technology, where Bluetooth devices are connected in ad-hoc fashion to form a piconet. Through the analysis of the piconet group key generation based on authenticated Deffie-Hellman group key generation protocol [1], each device in the Bluetooth piconet requires large memory space to store the keys. Although the protocol serves good security features, the number of messages exchange and total number of round is more so it requires high computing capability of each unit. The protocol has high overhead to compute the group key when a new member joins or leave into or from the group, it leads computational and communicational cost. In the present work Dynamic GKE(Group Key Exchange) protocol is more suitable to generate group key for Bluetooth piconet than GDH.2 and ECGDH protocols. Deffie-Hellman based Dynamic GKE (Group Key Exchange) protocol [47] has comparatively low round as well as communication cost for group key generation then existing one. The Dynamic GKE protocol is non-authenticated one, so before applying this we assume each mobile client (slave) and the powerful node(master) is already been authenticated manually or some other Deffie-Hellman based method have been used to authenticate the devices. The Dynamic GKE protocol is applicable for piconet group key generation. Dynamic GKE protocol is more efficient in the case of member join/leave

[1]  James Kardach !"#$%&&%' Architecture Overview , 2000 .

[2]  Daniele Miorandi,et al.  Performance Characterization of a Bluetooth Piconet with Multi–Slot Packets , 2003 .

[3]  Yu Xin,et al.  Application of Group Key Agreement Based on Authenticated Diffie-Hellman for Bluetooth Piconet , 2009, 2009 WASE International Conference on Information Engineering.

[4]  Eduardo Casilari-Pérez,et al.  Modeling of the transmission delay in bluetooth piconets under serial port profile , 2010, IEEE Transactions on Consumer Electronics.

[5]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[6]  Ford Long Wong,et al.  Protocols and technologies for security in pervasive computing and communications , 2008 .

[7]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[8]  Gerlando Falauto,et al.  Bluetooth Wireless Networks Security Features , 2001 .

[9]  Jukka Kaavi Group Key Distribution in Ad-Hoc Networks Using MIKEY , 2005 .

[10]  R.K. Cunningham,et al.  Securing Communication of Dynamic Groups in Dynamic Network-Centric Environments , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[11]  Mark Manulis,et al.  Security-Focused Survey on Group Key Exchange Protocols , 2006, IACR Cryptol. ePrint Arch..

[12]  Jelena V. Misic,et al.  Talk and let talk: performance of Bluetooth piconets with synchronous traffic , 2005, Ad Hoc Networks.

[13]  Joonsang Baek,et al.  Authentication and Key Establishment in Dynamic Wireless Sensor Networks , 2010, Sensors.

[14]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[15]  Emmanuel Bresson,et al.  A security solution for IEEE 802.11's ad hoc mode: password-authentication and group DiffieHellman key exchange , 2007, Int. J. Wirel. Mob. Comput..

[16]  Xiong Huagang,et al.  Performance estimation and evaluation of Bluetooth frequency hopping selection kernel , 2009, 2009 Joint Conferences on Pervasive Computing (JCPC).

[17]  William Stallings,et al.  Cryptography and network security , 1998 .

[18]  Yuh-Shyan Chen,et al.  A time-slot leasing-based QoS routing protocol over Bluetooth WPANs , 2007, Int. J. Ad Hoc Ubiquitous Comput..

[19]  Mario Gerla,et al.  Bluetooth: an enabler for personal area networking , 2001, IEEE Netw..

[20]  Dirk Fox,et al.  Bluetooth Security , 2002, Datenschutz und Datensicherheit.

[21]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[22]  Zihua Guo,et al.  Piconet security in IEEE 802:15.3 WPAN , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[23]  Leïla Azouz Saïdane,et al.  Priority based intra piconet scheduling scheme for QoS guaranties in Bluetooth networks , 2009, 2009 IEEE Symposium on Computers and Communications.

[24]  Joakim Persson,et al.  Bluetooth Security , 2004 .

[25]  Ludovic Rousseau,et al.  A Trusted Device to Secure a Bluetooth Piconet , 2001 .

[26]  Karen A. Scarfone,et al.  Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1) , 2012 .

[27]  N. Asokan,et al.  Key agreement in ad hoc networks , 2000, Comput. Commun..

[28]  Chung-Hsin Liu,et al.  The study for the optimal routing of Bluetooth Piconet , 2009, ICIS '09.

[29]  H. Aslaksen National university of singapore. , 1995, Environmental science & technology.

[30]  Jolyon Clulow,et al.  Repairing the Bluetooth Pairing Protocol , 2005, Security Protocols Workshop.

[31]  Uta Wille,et al.  Communication complexity of group key distribution , 1998, CCS '98.

[32]  Weili Wu,et al.  Lower bounds and new constructions on secure group communication schemes , 2008, Theor. Comput. Sci..

[33]  Cheng-Chi Lee,et al.  A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography , 2005, Telecommun. Syst..

[34]  D. Gollman,et al.  Key Management Protocols for Wireless Sensor Networks Diplomarbeit , 2006 .

[35]  Yuh-Min Tseng,et al.  Two-round contributory group key exchange protocol for wireless network environments , 2011, EURASIP J. Wirel. Commun. Netw..

[36]  Tatsuaki Okamoto,et al.  Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.

[37]  Markus Jakobsson,et al.  Security Weaknesses in Bluetooth , 2001, CT-RSA.

[38]  Chak-Kuen Wong,et al.  A conference key distribution system , 1982, IEEE Trans. Inf. Theory.

[39]  Abdul Rahman Ramli,et al.  Authentication Model Based Bluetooth-enabled Mobile Phone , 2005 .

[40]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[41]  Karen A. Scarfone,et al.  Guide to Bluetooth Security , 2008 .

[42]  Xiulin Hu,et al.  A Survey of Group Key Management , 2008, 2008 International Conference on Computer Science and Software Engineering.

[43]  Maarit Hietalahti Key Establishment in Ad-hoc Networks , 2001 .

[44]  Chatschik Bisdikian,et al.  An overview of the Bluetooth wireless technology , 2001, IEEE Commun. Mag..

[45]  Yuh-Shyan Chen,et al.  A CENTRALIZED TIME-SLOT LEASING-BASED QOS ROUTING PROTOCOL OVER BLUETOOTH WPANS , 2005 .

[46]  Chung-Hsin Liu,et al.  The Study of the Bluetooth Circular Path , 2008, 2008 International Conference on MultiMedia and Information Technology.

[47]  Gunhee Lee,et al.  An Enhanced Approach to Providing Secure Point-to-Multipoint Communication in Bluetooth Piconets , 2007, 2007 Second International Conference on Communications and Networking in China.