2nd International ICST Conference on Communications and Networking in China

Research Article

An Enhanced Approach to Providing Secure Point-to-Multipoint Communication in Bluetooth Piconets

  • @INPROCEEDINGS{10.1109/CHINACOM.2007.4469404,
        author={Subir Biswas and Syed Rehan Afzal and Jong-bin Koh and Mustafa Hasan and Gunhee Lee and Dong-kyoo Kim},
        title={An Enhanced Approach to Providing Secure Point-to-Multipoint Communication in Bluetooth Piconets},
        proceedings={2nd International ICST Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2008},
        month={3},
        keywords={Bluetooth Piconet Master node Master key Link key},
        doi={10.1109/CHINACOM.2007.4469404}
    }
    
  • Subir Biswas
    Syed Rehan Afzal
    Jong-bin Koh
    Mustafa Hasan
    Gunhee Lee
    Dong-kyoo Kim
    Year: 2008
    An Enhanced Approach to Providing Secure Point-to-Multipoint Communication in Bluetooth Piconets
    CHINACOM
    IEEE
    DOI: 10.1109/CHINACOM.2007.4469404
Subir Biswas1,*, Syed Rehan Afzal1,*, Jong-bin Koh1,*, Mustafa Hasan2,*, Gunhee Lee1,*, Dong-kyoo Kim1,*
  • 1: Graduate School of Information and Communication, Ajou University,San 5 Wonchun Dong, Yeongtong, Suwon- 443 749, Republic of Korea
  • 2: Graduate School of Information and Communication, Ajou University, San 5 Wonchun Dong, Yeongtong, Suwon- 443 749, Republic of Korea
*Contact email: subir@ajou.ac.kr, rehan@ajou.ac.kr, nitefly@ajou.ac.kr, hasan@ajou.ac.kr, icezzoco@ajou.ac.kr, dkkim@ajou.ac.kr

Abstract

In this paper, we suggest an extended security approach for Bluetooth’s point-to-multipoint communication. Bluetooth specification [1] defines the basic security measures like, key generation, authentication and encryption for a piconetwhich is the basic network unit of maximum 8 active Bluetooth devices. However, very little effort has been given so far on pointto- multipoint communication security in Bluetooth piconets. In this paper, we discover a Bluetooth security flaw in point-tomultipoint communication based on the master-key generation/re-generation process, for which, we suggested an appropriate prevention scheme. We analyze all possible alternative measures that can be taken before the master-key generation process starts in a master node and then we end up with an appropriate resolution. Our proposed solution expands the point-to-multipoint security and, is compatible with the existing Bluetooth Specification.