电源优化安全蓝牙通信

M. J. Chaudhry, S. Murawwat, F. Saleemi, S. Tariq, M. Saleemi, F. J. Chaudhry
{"title":"电源优化安全蓝牙通信","authors":"M. J. Chaudhry, S. Murawwat, F. Saleemi, S. Tariq, M. Saleemi, F. J. Chaudhry","doi":"10.1109/INMIC.2008.4777733","DOIUrl":null,"url":null,"abstract":"Bluetooth is one of the emerging technologies, which is capable of providing many services such as High data throughput, Adhoc networks, providing an excellent data transmission medium and many more other services and applications. To provide all these features and services power consumption is quite high in comparison with other mobile devices. Like keeping the device size small will result in less operation tine of device or degraded the throughput, so there is a strong need for a power optimized algorithm which keeps the data throughput higher using minimum power consumption. As Bluetooth defines a uniform structure for huge range of devices to communicate and transfer data with each other, with minimum user efforts, Bluetooth also offers wireless access to LANs, the mobile phone network and the internet for a host of many home appliances and portable handheld devices. As Bluetooth has to provide many services security issues have to satisfied like Bluetooth devices are part of peoples personal usage and will communicate and transfer their very personal information, confidential business information or other sensitive data. This must be protected from being spoofed or mutilated. Encryption facility is very excellent solution for security vulnerabilities occurs in Bluetooth communication. This paper presents the detailed comparison study of old and current algorithms and techniques used for power optimization and security issues in Bluetooth communication and an appropriate solution will be presented particularly for two major issues of Bluetooth power consumption, security and other issues related to both of them finally, an efficient scheme which will positively enable us to provide all the desired services and application but in an economical and secure way with respect to power consumption and security vulnerabilities. Furthermore, this research also presents the discussion of how proposed scheme can be implemented in a straight-forward fashion.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Power optimized secure Bluetooth communication\",\"authors\":\"M. J. Chaudhry, S. Murawwat, F. Saleemi, S. Tariq, M. Saleemi, F. J. Chaudhry\",\"doi\":\"10.1109/INMIC.2008.4777733\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Bluetooth is one of the emerging technologies, which is capable of providing many services such as High data throughput, Adhoc networks, providing an excellent data transmission medium and many more other services and applications. To provide all these features and services power consumption is quite high in comparison with other mobile devices. Like keeping the device size small will result in less operation tine of device or degraded the throughput, so there is a strong need for a power optimized algorithm which keeps the data throughput higher using minimum power consumption. As Bluetooth defines a uniform structure for huge range of devices to communicate and transfer data with each other, with minimum user efforts, Bluetooth also offers wireless access to LANs, the mobile phone network and the internet for a host of many home appliances and portable handheld devices. As Bluetooth has to provide many services security issues have to satisfied like Bluetooth devices are part of peoples personal usage and will communicate and transfer their very personal information, confidential business information or other sensitive data. This must be protected from being spoofed or mutilated. Encryption facility is very excellent solution for security vulnerabilities occurs in Bluetooth communication. This paper presents the detailed comparison study of old and current algorithms and techniques used for power optimization and security issues in Bluetooth communication and an appropriate solution will be presented particularly for two major issues of Bluetooth power consumption, security and other issues related to both of them finally, an efficient scheme which will positively enable us to provide all the desired services and application but in an economical and secure way with respect to power consumption and security vulnerabilities. Furthermore, this research also presents the discussion of how proposed scheme can be implemented in a straight-forward fashion.\",\"PeriodicalId\":112530,\"journal\":{\"name\":\"2008 IEEE International Multitopic Conference\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE International Multitopic Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INMIC.2008.4777733\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Multitopic Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INMIC.2008.4777733","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

摘要

蓝牙是一种新兴的技术,它能够提供高数据吞吐量、Adhoc网络等许多服务,提供了一种优秀的数据传输介质和许多其他服务和应用。为了提供所有这些功能和服务,与其他移动设备相比,功耗相当高。由于设备尺寸越小,设备的运行时间越短,吞吐量越低,因此迫切需要一种功耗优化算法,以最小的功耗保持较高的数据吞吐量。蓝牙为大量设备定义了一种统一的结构,用户只需付出最少的努力就可以相互通信和传输数据。蓝牙还为许多家用电器和便携式手持设备提供了无线接入局域网、移动电话网络和互联网的能力。由于蓝牙必须提供许多服务,安全问题必须得到满足,因为蓝牙设备是人们个人使用的一部分,并且会通信和传输他们的非常个人信息,机密商业信息或其他敏感数据。必须保护它不被欺骗或破坏。加密功能是解决蓝牙通信中出现的安全漏洞的一个很好的方案。本文对蓝牙通信中功耗优化和安全问题的旧算法和技术进行了详细的比较研究,并针对蓝牙功耗、安全以及与两者相关的两个主要问题提出了合适的解决方案。一个有效的方案,它将积极地使我们能够提供所有所需的服务和应用程序,但在功耗和安全漏洞方面,以经济和安全的方式。此外,本研究还讨论了如何以直接的方式实现所提出的方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Power optimized secure Bluetooth communication
Bluetooth is one of the emerging technologies, which is capable of providing many services such as High data throughput, Adhoc networks, providing an excellent data transmission medium and many more other services and applications. To provide all these features and services power consumption is quite high in comparison with other mobile devices. Like keeping the device size small will result in less operation tine of device or degraded the throughput, so there is a strong need for a power optimized algorithm which keeps the data throughput higher using minimum power consumption. As Bluetooth defines a uniform structure for huge range of devices to communicate and transfer data with each other, with minimum user efforts, Bluetooth also offers wireless access to LANs, the mobile phone network and the internet for a host of many home appliances and portable handheld devices. As Bluetooth has to provide many services security issues have to satisfied like Bluetooth devices are part of peoples personal usage and will communicate and transfer their very personal information, confidential business information or other sensitive data. This must be protected from being spoofed or mutilated. Encryption facility is very excellent solution for security vulnerabilities occurs in Bluetooth communication. This paper presents the detailed comparison study of old and current algorithms and techniques used for power optimization and security issues in Bluetooth communication and an appropriate solution will be presented particularly for two major issues of Bluetooth power consumption, security and other issues related to both of them finally, an efficient scheme which will positively enable us to provide all the desired services and application but in an economical and secure way with respect to power consumption and security vulnerabilities. Furthermore, this research also presents the discussion of how proposed scheme can be implemented in a straight-forward fashion.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Impact of nano particles on semiconductor manufacturing Graphical modeling and optimization of air interface standards for Software Defined Radios Per Packet Authentication for IEEE 802.11 wireless LAN An intelligent agri-information dissemination framework: An e-Government Characterization of waveguide slots using full wave EM analysis software HFSS
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1