Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections

Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections

Georgios Kambourakis (University of the Aegean, Greece), Angelos Rouskas (University of the Aegean, Greece) and Stefanos Gritzalis (University of the Aegean, Greece)
Copyright: © 2008 |Pages: 15
DOI: 10.4018/978-1-59904-899-4.ch041
OnDemand PDF Download:


Security is always an important factor in wireless connections. As with all other existing radio technologies, the Bluetooth standard is often cited to suffer from various vulnerabilities and security inefficiencies while attempting to optimize the trade-off between performance and complementary services including security. On the other hand, security protocols like IP secure (IPsec) and secure shell (SSH) provide strong, flexible, low cost, and easy to implement solutions for exchanging data over insecure communication links. However, the employment of such robust security mechanisms in wireless realms enjoins additional research efforts due to several limitations of the radio-based connections, for example, link bandwidth and unreliability. This chapter will evaluate several Bluetooth personal area network (PAN) parameters, including absolute transfer times, link capacity, throughput, and goodput. Experiments shall employ both Bluetooth native security mechanisms, as well as the two aforementioned protocols. Through a plethora of scenarios utilizing both laptops and palmtops, we offer a comprehensive in-depth comparative analysis of each of the aforementioned security mechanisms when deployed over Bluetooth communication links.

Key Terms in this Chapter

Goodput: The application level throughput, that is, the number of useful bits per unit of time forwarded by the network from a certain source address to a certain destination, excluding protocol overhead retransmissions, and so forth.

Secure Shell or SSH: A set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and to optionally allow the remote computer to authenticate the user. SSH provides confidentiality and integrity of data exchanged between the two computers using encryption and MACs.

Throughput: The amount of digital data per time unit that are delivered to a certain terminal in a network, from a network node, or from one node to another, for example, via a communication link.

IPSec: IPsec (IP security) is a suite of protocols for securing Internet protocol communications by encrypting and/or authenticating each IP packet in a data stream. IPsec also includes protocols for cryptographic key establishment. There are two modes of IPsec operation: transport mode and tunnel mode. IPsec is implemented by a set of cryptographic protocols for securing packet flows. Specifically, the authentication header (AH) protocol provides authentication, payload (message), and IP header integrity (with some cryptography algorithm also nonrepudiation). On the other hand, the encapsulating security payload (ESP) protocol provides data confidentiality, payload (message) integrity, and with some cryptography algorithm also authentication.

Bluetooth: An industrial specification for wireless personal area networks (PANs). Bluetooth provides a way to connect and exchange information between devices such as mobile phones, laptops, PCs, printers, digital cameras, and video game consoles via a secure, globally unlicensed short-range radio frequency.

Network Performance: The level of quality of service of a telecommunications resource, protocol, or product.

IEEE 802.15: The IEEE 802.15 WPAN working group focuses on the development of consensus standards for personal area networks or short distance wireless networks. These WPANs address wireless networking of portable and mobile computing devices such as PCs, PDAs, peripherals, cell phones, pagers, and consumer electronics, allowing these devices to communicate and interoperate with one another. The IEEE Project 802.15.1 has derived a wireless personal area network standard based on the Bluetooth v1.1 Foundation Specifications.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Yan Zhang, Jun Zheng, Miao Ma
Yan Zhang, Jun Zheng, Miao Ma
Chapter 1
Thomas M. Chen, Cyrus Peikari
This chapter examines the scope of malicious software (malware) threats to mobile devices. The stakes for the wireless industry are high. While... Sample PDF
Malicious Software in Mobile Devices
Chapter 2
Sheikh I. Ahamed, John F. Buford, Moushumi Sharmin, Munirul M. Haque, Nilothpal Talukder
In broadband wireless networks, mobile devices will be equipped to directly share resources using service discovery mechanisms without relying upon... Sample PDF
Secure Service Discovery
Chapter 3
Zbigniew Kotulski, Aneta Zwierko
The recent development in the mobile technology (mobile phones, middleware, wireless networks, etc.) created a need for new methods of protecting... Sample PDF
Security of Mobile Code
Chapter 4
Identity Management  (pages 44-60)
Kumbesan Sandrasegaran, Mo Li
The broad aim of identity management (IdM) is to manage the resources of an organization (such as files, records, data, and communication... Sample PDF
Identity Management
Chapter 5
Wireless Wardriving  (pages 61-77)
Luca Caviglione
Wardriving is the practice of searching wireless networks while moving. Originally, it was explicitly referred to as people searching for wireless... Sample PDF
Wireless Wardriving
Chapter 6
Amel Meddeb Makhlouf, Noureddine Boudriga
The broadcast nature of wireless networks and the mobility features created new kinds of intrusions and anomalies taking profit of wireless... Sample PDF
Intrusion and Anomaly Detection in Wireless Networks
Chapter 7
Lu Yan
A lot of networks today are behind firewalls. In peer-to-peer (P2P) networking, firewall-protected peers may have to communicate with peers outside... Sample PDF
Peer-to-Peer (P2P) Network Security: Firewall Issues
Chapter 8
Mohammad M.R. Chowdhury, Josef Noll
Ubiquitous access and pervasive computing concept is almost intrinsically tied to wireless communications. Emerging next-generation wireless... Sample PDF
Identity Management for Wireless Service Access
Chapter 9
Peter Langendörfer, Michael Maaser, Krzysztof Piotrowski, Steffen Peter
This chapter provides a survey of privacy-enhancing techniques and discusses their effect using a scenario in which a charged location-based service... Sample PDF
Privacy-Enhancing Technique: A Survey and Classification
Chapter 10
Lawan A. Mohammed, Biju Issac
This chapter shows that the security challenges posed by the 802.11 wireless networks are manifold and it is therefore important to explore the... Sample PDF
Vulnerability Analysis and Defenses in Wireless Networks
Chapter 11
György Kálmán, Josef Noll
This chapter deals with challenges raised by securing transport, service access, user privacy, and accounting in wireless environments. Key... Sample PDF
Key Distribution and Management for Mobile Applications
Chapter 12
Said Zaghloul, Admela Jukan
The architecture, and protocols for authentication, authorization, and accounting (AAA) are one of the most important design considerations in third... Sample PDF
Architecture and Protocols for Authentication, Authorization, and Accounting in the Future Wireless Communications Networks
Chapter 13
Josef Noll, György Kálmán
Converging networks and mobility raise new challenges towards the existing authentication, authorisation, and accounting (AAA) systems. Focus of the... Sample PDF
Authentication, Authorisation, and Access Control in Mobile Systems
Chapter 14
Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga
Wireless networks are gaining popularity that comes with the occurrence of several networking technologies raising from personal to wide area, from... Sample PDF
Trustworthy Networks, Authentication, Privacy, and Security Models
Chapter 15
Jianfeng Ma, Xinghua Li
In the design and analysis of authentication and key agreement protocols, provably secure formal methods play a very important role, among which the... Sample PDF
The Provably Secure Formal Methods for Authentication and Key Agreement Protocols
Chapter 16
Shiguo Lian
In a wireless environment, multimedia transmission is often affected by the error rate; delaying; terminal’s power or bandwidth; and so forth, which... Sample PDF
Multimedia Encryption and Watermarking in Wireless Environment
Chapter 17
Paris Kitsos
In this chapter, a system-on-chip design of the newest powerful standard in the hash families, named Whirlpool, is presented. With more details an... Sample PDF
System-on-Chip Design of the Whirlpool Hash Function
Chapter 18
Security in 4G  (pages 272-296)
Artur Hecker, Mohamad Badra
The fourth generation (4G) of mobile networks will be a technology-opportunistic and user-centric system combining the economic and technological... Sample PDF
Security in 4G
Chapter 19
Christoforos Ntantogian, Christos Xenakis
The integration of heterogeneous mobile/wireless networks using an IP-based core network materializes the beyond third generation (B3G) mobile... Sample PDF
Security Architectures for B3G Mobile Networks
Chapter 20
Christos Xenakis
This chapter analyzes the security architecture designed for the protection of the universal mobile telecommunication system (UMTS). This... Sample PDF
Security in UMTS 3G Mobile Networks
Chapter 21
Yan Zhang, Yifan Chen, Rong Yu, Supeng Leng, Huansheng Ning, Tao Jiang
Motivated by the requirements for higher data rate, richer multimedia services, and broader radio range wireless mobile networks are currently in... Sample PDF
Access Security in UMTS and IMS
Chapter 22
Christos Xenakis
The global system for mobile communications (GSM) is the most popular standard that implements second generation (2G) cellular systems. 2G systems... Sample PDF
Security in 2.5G Mobile Systems
Chapter 23
Sasan Adibi, Gordon B. Agnew
Security measures of mobile infrastructures have always been important from the early days of the creation of cellular networks. Nowadays, however... Sample PDF
End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies
Chapter 24
Silke Holtmanns, Pekka Laitinen
This chapter outlines how cellular authentication can be utilized for generic application security. It describes the basic concept of the generic... Sample PDF
Generic Application Security in Current and Future Networks
Chapter 25
Sangheon Pack, Sungmin Baek, Taekyoung Kwon, Yanghee Choi
Network mobility (NEMO) enables seamless and ubiquitous Internet access while on-board vehicles. Even though the Internet Engineering Task Force... Sample PDF
Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments
Chapter 26
Bin Lu
Mobile ad hoc network (MANET) is a self-configuring and self-maintaining network characterized as dynamic topology, absence of infrastructure, and... Sample PDF
Security in Mobile Ad Hoc Networks
Chapter 27
Christer Andersson, Leonardo A. Martucci, Simone Fischer-Hübner
Providing privacy is often considered a keystone factor for the ultimate take up and success of mobile ad hoc networking. Privacy can best be... Sample PDF
Privacy and Anonymity in Mobile Ad Hoc Networks
Chapter 28
Tomasz Ciszkowski, Zbigniew Kotulski
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) significant researchers’ attention, due to its innate... Sample PDF
Secure Routing with Reputation in MANET
Chapter 29
Paolo Bellavista, Rebecca Montanari, Daniela Tibaldi, Alessandra Toninelli
The increasing diffusion of wireless portable devices and the emergence of mobile ad hoc networks promote anytime and anywhere opportunistic... Sample PDF
Trust Management and Context-Driven Access Control
Chapter 30
Bing Wu, Jie Wu, Mihaela Cardei
Security has become a primary concern in mobile ad hoc networks (MANETs). The characteristics of MANETs pose both challenges and opportunities in... Sample PDF
A Survey of Key Management in Mobile Ad Hoc Networks
Chapter 31
Sasan Adibi, Gordon B. Agnew
Mobile ad hoc networks (MANETs) have gained popularity in the past decade with the creation of a variety of ad hoc protocols that specifically offer... Sample PDF
Security Measures for Mobile Ad-Hoc Networks (MANETs)
Chapter 32
Hao Yin, Chuang Lin, Zhijia Chen, Geyong Min
The integration of wireless communication and embedded video systems is a demanding and interesting topic which has attracted significant research... Sample PDF
A Novel Secure Video Surveillance System Over Wireless Ad Hoc Networks
Chapter 33
John Felix Charles Joseph, Amitabha Das, Boon-Chong Seet, Bu-Sung Lee
Intrusion detection in ad hoc networks is a challenge because of the inherent characteristics of these networks, such as, the absence of centralized... Sample PDF
Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks
Chapter 34
Luis E. Palafox, J. Antonio Garcia-Macias
In this chapter we present the growing challenges related to security in wireless sensor networks. We show possible attack scenarios and evidence... Sample PDF
Security in Wireless Sensor Networks
Chapter 35
Mohamed Hamdi, Noreddine Boudriga
The applications of wireless sensor networks (WSNs) are continuously expanding. Recently, consistent research and development activities have been... Sample PDF
Security and Privacy in Wireless Sensor Networks: Challenges and Solutions
Chapter 36
A.R. Naseer, Ismat K. Maarouf, Ashraf S. Hasan
Since routing is a fundamental operation in all types of networks, ensuring routing security is a necessary requirement to guarantee the success of... Sample PDF
Routing Security in Wireless Sensor Networks
Chapter 37
Yawen Wei, Zhen Yu, Yong Guan
Localization of sensor nodes is very important for many applications proposed for wireless sensor networks (WSN), such as environment monitoring... Sample PDF
Localization Security in Wireless Sensor Networks
Chapter 38
Miao Ma
One of the severe security threats in wireless sensor network is false data injection attack, that is, the compromised sensors forge the events that... Sample PDF
Resilience Against False Data Injection Attack in Wireless Sensor Networks
Chapter 39
Jean-Marc Seigneur, Luminita Moraru, Olivier Powell
Weiser (1991) envisioned ubiquitous computing with computing and communicating entities woven into the fabrics of every day life. This chapter deals... Sample PDF
Survivability of Sensors with Key and Trust Management
Chapter 40
Yu Wang
Fault tolerance is one of the premier system design desiderata in wireless ad hoc and sensor networks. It is crucial to have a certain level of... Sample PDF
Fault Tolerant Topology Design for Ad Hoc and Sensor Networks
Chapter 41
Georgios Kambourakis, Angelos Rouskas, Stefanos Gritzalis
Security is always an important factor in wireless connections. As with all other existing radio technologies, the Bluetooth standard is often cited... Sample PDF
Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections
Chapter 42
Miguel A. Ruiz, Felipe Espinosa, David Sanguino, AbdelBaset Awawdeh
The electromagnetic energy source used by wireless communication devices in a vehicle can cause electromagnetic compatibility problems with the... Sample PDF
Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring
Chapter 43
Security in WLAN  (pages 695-709)
Mohamad Badra, Artur Hecker
The great promise of wireless LAN will never be realized unless there is an appropriate security level. From this point of view, various security... Sample PDF
Security in WLAN
Chapter 44
Jahan Hassan, Björn Landfeldt, Albert Y. Zomaya
Wireless local area networks (WLAN) are rapidly becoming a core part of network access. Supporting user mobility, more specifically session... Sample PDF
Access Control in Wireless Local Area Networks: Fast Authentication Schemes
Chapter 45
Denis Trcek
Mass deployment of radio-frequency identification (RFID) technology is now becoming feasible for a wide variety of applications ranging from medical... Sample PDF
Security and Privacy in RFID Based Wireless Networks
Chapter 46
Giorgos Kostopoulos, Nicolas Sklavos, Odysseas Koufopavlou
Wireless communications are becoming ubiquitous in homes, offices, and enterprises with the popular IEEE 802.11 wireless local area network (LAN)... Sample PDF
Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANs)
Chapter 47
Sasan Adibi, Gordon B. Agnew, Tom Tofigh
An overview of the technical and business aspects is given for the corporate deployment of services over worldwide interoperability for microwave... Sample PDF
End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications
Chapter 48
Symeon Chatzinotas, Jonny Karlsson, Göran Pulkkis, Kaj Grahn
During the last few years, mobile broadband access has been a popular concept in the context of fourth generation (4G) cellular systems. After the... Sample PDF
Evaluation of Security Architectures for Mobile Broadband Access
Chapter 49
Sasan Adibi, Gordon B. Agnew
Authentication is an important part of the authentication authorization and accounting (AAA) schemes and the extensible authentication protocol... Sample PDF
Extensible Authentication (EAP) Protocol Integrations in the Next Generation Cellular Networks
About the Contributors