This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Hardware Implementation of Bluetooth Security
January-March 2003 (vol. 2 no. 1)
pp. 21-29
Paraskevas Kitsos, University of Patras, Greece
Nicolas Sklavos, University of Patras, Greece
Kyriakos Papadomanolakis, University of Patras, Greece
Odysseas Koufopavlou, University of Patras, Greece

The authors present a hardware implementation of the Bluetooth system security layer. The Bluetooth security layer includes key-generating mechanisms, authentication, and data encryption. The first two can be implemented in software or hardware. For applications where the processing time is not critical, the software implementation usually satisfies user requirements. However, in time-critical applications requiring a fast connection and in devices with processing constraints, the hardware implementation is preferable.

Index Terms:
Bluetooth, security, Safer+, authentication, key generation mechanism, E0 stream cipher, data encryption
Citation:
Paraskevas Kitsos, Nicolas Sklavos, Kyriakos Papadomanolakis, Odysseas Koufopavlou, "Hardware Implementation of Bluetooth Security," IEEE Pervasive Computing, vol. 2, no. 1, pp. 21-29, Jan.-March 2003, doi:10.1109/MPRV.2003.1186722
Usage of this product signifies your acceptance of the Terms of Use.