Journal of Northeastern University ›› 2003, Vol. 24 ›› Issue (5): 424-428.DOI: -

• OriginalPaper • Previous Articles     Next Articles

New scheme of improving link key for Bluetooth security

Ren, Xiu-Li (1); Quan, Chengbin (1); Fan, Li-Jun (1); Luan, Gui-Xing (2)   

  1. (1) Sch. of Info. Sci. and Eng., Northeastern Univ., Shenyang 110004, China; (2) Shenyang Inst. of Comp. Technol., Acad. Sci., Shenyang 110004, China
  • Received:2013-06-24 Revised:2013-06-24 Online:2003-05-15 Published:2013-06-24
  • Contact: Ren, X.-L.
  • About author:-
  • Supported by:
    -

Abstract: Bluetooth has two defects in its security. When the encryption key is exchanged between two units, the third party can capture the encryption key as one of the two units to communicate with the other. The third party can obtain the public Bluetooth address, easily trace all operation of the unit and know the other. A new scheme was proposed to improve a link key. By making use of DES algorithm, a link key was created by constructing a Hash function to ensure both information security and establish a more robust security mechanism for the Bluetooth wireless ad-hoc network. The scheme can be regarded as a reference of revising the unit key.

CLC Number: