Authenticated Data Scrambler and Descrambler for Advanced Bluetooth devices
نویسندگان
چکیده
Each network device or portable device with HOST interface (radio or cable) has several hierarchical structures which distribute functionality between different layers of that device. The hierarchy defined radio interface, base band layer. During development of the Bluetooth module, a new complex architecture is integrated; it supports low cost upgrades related to new generations of Bluetooth devices. This paper presents the Bluetooth technology and its architecture. The base band layer performs the functions related to interface interaction between the Bluetooth chipset and an external or integrated radio chip and a host system. In base band, different modules for data processing are integrated, like modules for generating scrambling base band module of blue tooth. The development of the module has been done with hardware description language VHDL. This permitted us to perform top level functional verification and debugging, as well as detailed subsystem simulations throughout the design process.
منابع مشابه
Synchronization of shift register generators in general distributed sample scramblers
In this paper, a theory is developed to support the synchronization of shift register generators (SRG’s) in the general class of distributed sample scramblers (DSS’s). In the general DSS, the samples transmitted to the descrambler for its synchronization are freely generated out of the scrambler SRG, a special case of which is to take samples directly from the SRG sequence. To describe this gen...
متن کاملEfficient Mutual Data Authentication Using Manually Authenticated Strings
Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short range wireless communication. All such key exchange protocols employ data authentication as an unavoidable subtask. As a solution, we propose an asymptotically optimal protocol family for data authentication that uses short man...
متن کاملEfficient Mutual Data Authentication Using Manually Authenticated Strings: Extended Version
Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short range wireless communication. All such key exchange protocols employ data authentication as an unavoidable subtask. As a solution, we propose an asymptotically optimal protocol family for data authentication that uses short man...
متن کاملASIC Design of 600Mbps 4 4× MIMO Wireless LAN System
This paper shows the design and ASIC implementation of a 802.11n WLANs 4x4 MIMO OFDM PHY transceiver. The system supports the maximum data rate of 600Mbps. The MMSE-SQRD SIC MIMO decoder scheme, which has high BER performance and acceptable hardware cost, is implemented. To meet the required high throughput rate, parallel processing Scrambler/Descrambler, parallel processing BCC, and radix-4 so...
متن کاملMaking Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices
Connectivity becomes increasingly important also for small embedded systems such as typically found in industrial control installations. More and more use-cases require secure remote user access increasingly incorporating handheld based human machine interfaces, using wireless links such as Bluetooth. Correspondingly secure operator authentication becomes of utmost importance. Unfortunately, of...
متن کامل