On Security Provision in Demanding Cyberphysical Bluetooth based Systems

During the last few years, short range wireless communication technologies are increasingly utilized in highly demanding applications characterized by strict performance and security demands. Among various respective communication technologies Bluetooth comprises a prominent candidate founding its way in a wide variety of commercial products. Respective implementations offer significant advantages such as low complexity, cost and power dissipation while supporting adequate performance with respect to demanding applications such as video, audio transfer and/or of high criticality such as medical oriented application scenarios. However, as security requirements increase so does the need for advanced state of the art security algorithms' implementations offering enhanced performance, resources conservations and being able to be applied in a variety of technologies. Respective requirements were highlighted in the context of ARMOR FP7 project where Bluetooth based sensors were utilized to acquire required bio-signals related to Epilepsy monitoring. This paper presents the authors' efforts and contributions in two main axes. On one hand a realistic, based on adequate research platform, performance evaluation is undertaken aiming to expose the effect of standard Bluetooth security mechanisms on network performance, as well as critical network parameters. In this context a wide range of network parameters are considered as well as security configurations. On the other hand, driven by identified Bluetooth shortcomings especially regarding security weaknesses as well as technology specific security algorithm utilized, a highly configurable as well as efficient hardware based implementation of a state-of-the-art cipher algorithm is proposed and presented. The main objective of this effort is to present a security hardware module agnostic to the underlying technologies thus able to be easily integrated in any existing or future short wireless communication platform in order to offer a design of increased added value. Additionally, the proposed hardware module is compared to respective competition exhibiting critical advantages in all critical metrics. Summarizing this work offers valuable insights concerning the Bluetooth based platforms performance and behavior with respect to security mechanism while proposing a specific hardware design which can significantly increase security provision without comprising communication efficiency and resource expenditure.

[1]  M. Hamad,et al.  Real time video streaming over Bluetooth using software technique , 2009, 2009 International Conference on Advances in Computational Tools for Engineering Applications.

[2]  Juan-Carlos Cano,et al.  Evaluation of the energetic impact of Bluetooth low-power modes for ubiquitous computing applications , 2006, PE-WASUN '06.

[3]  George Krikis,et al.  Design and implementation of efficient reconfigurable cipher algorithms for wireless sensor networks , 2013, 2013 11th IEEE International Conference on Industrial Informatics (INDIN).

[4]  Frederic P. Miller,et al.  Advanced Encryption Standard , 2009 .

[5]  R. Kling,et al.  The Intel/sup /spl reg// mote platform: a Bluetooth-based sensor network for industrial monitoring , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[6]  Brian A. Carter,et al.  Advanced Encryption Standard , 2007 .

[7]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[8]  Samarjit Chakraborty,et al.  Comparing Bluetooth HDP and SPP for Mobile Health Devices , 2010, 2010 International Conference on Body Sensor Networks.

[9]  R.A. Rashid,et al.  Bluetooth Performance Analysis in Personal Area Network (PAN) , 2006, 2006 International RF and Microwave Conference.

[10]  Konstantinos Antonopoulos,et al.  The effect of symmetric block ciphers on WSN performance and behavior , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[11]  Jeffrey B. Hall Brush up on Bluetooth , 2003 .

[12]  Sang Hyuk Son,et al.  The price of security in wireless sensor networks , 2010, Comput. Networks.

[13]  K. M. S. Soyjaudah,et al.  Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security , 2009, Int. J. Netw. Secur..

[14]  Marco Conti,et al.  Wireless access to internet via Bluetooth: performance evaluation of the EDC scheduling algorithm , 2001, WMI '01.

[15]  Yu-Lin Tsou,et al.  Design, development and testing of a wireless sensor network for medical applications , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[16]  George Papadopoulos,et al.  CSMA-MAC Performance Evaluation for WSN Applications , 2009, 2009 Third International Conference on Sensor Technologies and Applications.