Security Enhancement in Bluetooth Hybrid Ring Topology (BLU-HRT) using Elliptic Curve Cryptography

*, J. Rajendra Prasad**, R. Kiran Kumar***
* Assistant Professor, Department of Computer Applications, PVP Siddhartha Institute of Technology, Vijayawada, India.
** Professor, Department of Information Technology, PVP Siddhartha Institute of Technology, Vijayawada, Andhra Pradesh, India.
*** Assistant Professor, Department of Computer Science, Krishna University, Machilipatnam, India.
Periodicity:April - June'2017
DOI : https://doi.org/10.26634/jwcn.6.1.13771

Abstract

Scatternet development and its routing are significant issues for the upcoming Bluetooth technologies. Likewise, security is also one of the significant issues. The security in the Bluetooth Scatternet construction is foremost aspect to assure the usage of Bluetooth network. BlueHRT (Bluetooth Hybrid Ring Topology) is a scatternet that works on the uneven dissemination of devices. The BlueHRT is a composition of ring of trees and it is envisioned to amalgamate the advantages of both BlueRing and BlueTree and instantaneously conflicts its restrictions. So as to overwhelm this issue of Un-Authentication and provide Confidentiality on the data packets of Scatternet Topology, this paper introduced the novel security enhancement to the existing Bluetooth Hybrid Ring Topology at the time of routing the data between one nodes to other node by means of Elliptic Curve Cryptography technique. ECC is a technique in public-key cryptography depending on the arithmetic procedure of elliptic curves over the limited areas. The experimental results showed that this suggested approach has better performance in terms of packet delivery fraction, Communication Overhead, and percentage of packets dropped that moved over malicious node compared with the existing BlueHRT technique.

Keywords

Bluetooth, MANETS, Elliptic Curve Cryptography, Routing Algorithm, Security

How to Cite this Article?

Sri, T.S., Prasad, J.R., and Kumar, R.K. (2017). Security Enhancement in Bluetooth Hybrid Ring Topology (BLU-HRT) using Elliptic Curve Cryptography. i-manager’s Journal on Wireless Communication Networks, 6(1), 12-21. https://doi.org/10.26634/jwcn.6.1.13771

References

[1]. Al-Kassem, I., Sharafeddine, S., Dawy, Z. (2009). BlueHRT: hybrid ring tree scatternet formation in Bluetooth networks. IEEE Symposium on Computers and Communications (pp. 165-169).
[2]. Basagni, S., & Petrioli, C. (2002). Multihop Scatternet th Formation for Bluetooth Networks. IEEE 55 Vehicular Technology Conference (Vol. 1, pp. 424 –428).
[3]. Bluetooth Special Interest Group. In Bluetooth SIG M e m b e r W e b s i t e . R e t r i e v e d f r o m http://www.bluetooth.org
[4]. Cuomo, F., & Melodia, T. (2002). A General Methodology and Key Metrics for Scatternet Formation in Bluetooth. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '02).
[5]. Cuomo, F., Melodia, T., & Akyildiz, I. F. (2004). Distributed Self-Healing and Variable Topology Optimization Algorithms for QoS Provisioning in Scatternets. IEEE Journal on Selected Areas in Comm., 22, 1220-1236.
[6]. Debnath, R., Kundu, B. C., Pradhan, M., & Pradhan, D. (2011). Lossless Secure Transmission in Bluetooth nd Scatternet, Considering Device Mobility. 2 International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronics Systems Technology (pp. 1-5).
[7]. Haartsen, J. (1998). BLUETOOTH - the universal radio interface for ad hoc wireless connectivity. Ericsson Review, 3, 110-117.
[8]. Handy, M., Blumenthal, J., & Timmermann, D. (2004). Energy efficient data collection for Bluetooth-based sensor networks. In Proc. IEEE Instrumentation and Measurement Technology Conference (IMTC).
[9]. Liong, S. S. Barnaghi, P. M. (2005). Bluetooth Network Security: A New Approach to Secure Scatternet Formation. TENCON 2005 (pp. 1-6). IEEE.
[10]. Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D., & Anderson, J. (2002). Wireless Sensor Networks for habitat st monitoring. In Proc. 1 ACM International Workshop on Wireless Sensor Networks and Applications (WSNA) (pp.88-97).
[11]. Mehta, V., & Zarki, M.E. (2004). A Bluetooth based sensor network for civil infrastructure health monitoring. In ACM/Kluwer Journal on Wireless Networks (WINET). 10(4), 401- 412.
[12]. Petrioli, C., Basagni, S., & Chlamtac, I. (2003). Configuring Blue Stars: Multihop Scatternet Formation for Bluetooth Networks. IEEE Transaction on Computers, 52(6), 779-790.
[13]. Shek, L. L.-Y.,& Kwok, Y.-K. (2003). An Integrated Approach to Scatternet Traffic Management in Bluetooth th Ad Hoc Networks. In Proceedings of the 27 Annual International Computer Software and Applications Conference (COMPSAC03).
[14]. Specification of the Bluetooth System. Retrieved from https://www.bluetooth.org/Technical/Specifications/ adopted.htm. Volume 1, Core. Ver. 4.0, June 2010.
[15]. Wang, Z., Thomas, R. J., & Haas, Z. (2001). Bluenet – A New Scatternet Formation Scheme. Proceedings of the 35 Annual Hawaii International Conference on System Sciences (pp. 779-787).
[16]. Zaruba, G. V., Basagni, S., & Chlamtac, I. (2001). Bluetrees-scatternet formation to enable Bluetoothbased ad hoc networks. IEEE International Conference on Communications (Vol. 1, pp. 273 –277).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.