Bluetooth Wireless Network Authentication Using Radio Frequency Communication Protocol

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TMCP: Two-layer multicast communication protocol for Bluetooth radio networks

Bluetooth is a low power, low cost, and short-range wireless technology developed for Personal Area Networks (PANs). A Bluetooth multicast group is a set of Bluetooth devices that desire for periodically receiving the multicast messages from the same source. For reducing the propagation delay and saving the bandwidth and energy consumptions, a multicast tree which connects all multicast members...

متن کامل

Bluetooth Mesh Network Protocol

Paper deals with simple and efficient protocols for forming and maintaining a Bluetooth network. The protocols are designed for mobile situations with frequent topology changes and for routing of translated messages between Bluetooth network members. To provide a simple, distributed solution to form an ad hoc network the protocols are based on a set of rules. The resulting topology is a mesh ne...

متن کامل

Detecting rogue devices in bluetooth networks using radio frequency fingerprinting

Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and initiate other forms of attacks. This paper investigates a novel intrusion detection approach, which makes use of radio frequency fingerprinting (RFF) for profiling, Hotelling’s T 2 statistics for classification and a dec...

متن کامل

Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems

In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and randomized by means of error-correcting codes. In this work, it is shown that Park’s protocol does not provide anonymity and untraceability. More precisely, the users real identities can be obtained easily by an eaves...

متن کامل

An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks

Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless broadband networks showing rapid progress and inspiring numerous compelling applications. A WMN comprises of a set of mesh routers (MRs) and mesh clients (MCs), where MRs are connected to the Internet backbone through the Internet gateways (IGWs). The MCs are wireless devices and communicate among themse...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Science

سال: 2009

ISSN: 1549-3636

DOI: 10.3844/jcssp.2009.646.650