The Community for Technology Leaders
Green Image
Issue No. 01 - January-March (2003 vol. 2)
ISSN: 1536-1268
pp: 21-29
Odysseas Koufopavlou , University of Patras, Greece
Kyriakos Papadomanolakis , University of Patras, Greece
Nicolas Sklavos , University of Patras, Greece
Paraskevas Kitsos , University of Patras, Greece
<p>The authors present a hardware implementation of the Bluetooth system security layer. The Bluetooth security layer includes key-generating mechanisms, authentication, and data encryption. The first two can be implemented in software or hardware. For applications where the processing time is not critical, the software implementation usually satisfies user requirements. However, in time-critical applications requiring a fast connection and in devices with processing constraints, the hardware implementation is preferable.</p>
Bluetooth, security, Safer+, authentication, key generation mechanism, E0 stream cipher, data encryption
Odysseas Koufopavlou, Kyriakos Papadomanolakis, Nicolas Sklavos, Paraskevas Kitsos, "Hardware Implementation of Bluetooth Security", IEEE Pervasive Computing, vol. 2, no. , pp. 21-29, January-March 2003, doi:10.1109/MPRV.2003.1186722
99 ms
(Ver 3.3 (11022016))