期刊文献+

蓝牙位置隐私保护安全协议设计 被引量:1

Design of Security Protocol on Bluetooth Location Privacy Protection
下载PDF
导出
摘要 针对蓝牙规范固定设备地址易导致用户位置隐私泄露的问题,从蓝牙查询、寻呼和会话连接三个方面入手,建立了蓝牙地址保护层次模型,通过引入加密和身份认证等安全机制,系统设计了蓝牙安全查询、寻呼及会话更新协议,并对协议的安全性进行了分析,保证了蓝牙跳频通信过程中设备地址安全。在此基础上,结合FPGA硬件开发平台和蓝牙射频模块,构建了蓝牙位置隐私保护实验环境,对协议的执行性能进行了仿真与测试分析。实验结果表明,协议不仅能够有效抵抗窃听攻击、重放攻击、中间人攻击、查询地址和会话地址跟踪攻击等,而且存储和计算开销较小,满足嵌入式蓝牙系统要求。 The leakage of users’ location privacy was caused by fixed bluetooth device address defined in the bluetooth specification. To solve the problem, a bluetooth address protection hierarchical model was established in terms of inquiry, paging and conversation. With the introduction of security mechanisms such as encryption and authentication, security protocols for inquiry, paging and conversation update were designed and analyzed to protect bluetooth device address during frequency hopping communication. With FPGA hardware and bluetooth radio module, an experiment environment was constructed and the performance of security protocols was simulated and tested. The experiment results show that the protocols can not only resist eavesdropping, replay attack, man-in-the-middle attack, inquiry address and conversation address tracking attack, but also have little computing and storage cost and meet the requirements of embedded bluetooth system.
机构地区 信息工程大学
出处 《系统仿真学报》 CAS CSCD 北大核心 2014年第4期897-902,共6页 Journal of System Simulation
关键词 蓝牙 位置隐私 安全协议 查询 寻呼 会话更新 bluetooth location privacy security protocol inquiry paging conversation update
  • 相关文献

参考文献10

  • 1Bluetooth Special Interest Group. Bluetooth SIG Specification of the Bluetooth system: core package version 4.0 [EB/OL]. (2009-12-17) [2014-3-4]. http://www.bluetooth.org.
  • 2Nateq Be-Nazir Ibn Minar, Mohammed Tarique. Bluetooth Security Threats and Solutions: A Survey [J]. International Journal of Distributed and Parallel Systems (S0976-9757), 2012, 3(1): 127-148.
  • 3Manish Shrivastava. Analysis of Security Risks in Bluetooth [J]. International Journal of Computing Academic Research ($2305-9184), 2012, 1(2): 88-95.
  • 4Veenanand Kakarla, N S Govind. FPGA Implementation of Hybrid Encryption Algorithm Based on Triple DES and RSA in Bluetooth Communication [J]. International Journal of Applied Research and Studies ($2278-9480), 2012, 1(1): 113-117.
  • 5Jakobsson M, Wetzel S. Security weaknesses in Bluetooth [C]// Cryptographer's Track at RSA Conf 2001, San Francisco, California, USA. Berlin, Germany: Springer Berlin Heidelberg, 2001: 176-191.
  • 6Haase M, Handy M. BlueTrack - Imperceptible Tracking of Bluetooth Devices [EB/OL]. (2004-9-10) [2014-3-4]. http://ubicomp.org/ubicomp2004/adjunct/posters/haase.pdf.
  • 7Solon A, Callaghan M, Harkin J. Case Study on the Bluetooth Vulnerabilities in Mobile Devices [J]. International Journal of Computer Science and Network Security (S 1738-7906), 2006, 6(4): 125-129.
  • 8Gehrmann C, Nyberg K. Enhancements to Bluetooth baseband security [C]// Proceedings of Nordsec 2001, Copenhagen, Denmark. Copenhagen, Denmark: Informatics and Mathematical Modelling, Technical University of Denmark, DTU, 2001:191-205.
  • 9Wong F, Stajano F. Location Privacy in Bluetooth [C]// Security and Privacy in AdHoe and Sensor Networks, Visegrad (HU). Berlin, Germany: Springer Berlin Heidelberg, 2005:176-188.
  • 10郁滨,张顺.蓝牙位置隐私保护方案的研究与设计[J].通信学报,2011,32(9):116-122. 被引量:3

二级参考文献12

  • 1BERESFORD A R, STAJANO F. Location privacy in pervasive computing[J]. IEEE Pervasive Computing, 2003,2(1):46-55.
  • 2LIU L. From data privacy to location privacy: models and algorithms[A]. Proceedings of The 33rd International Conference on Very Large Data Bases(VLDB'07)[C]. Vienna, Austria, 2007. 1429- 1430.
  • 3JAKOBSSON M, WETZEL S. Security weaknesses in bluetooth[A]. Cryptographer's Track at RSA Conf. 2001[C]. San Francisco, California, USA, 2001.176-191.
  • 4WHITEHOUSE O. RedFang[EB/OL]. http://www.atstake.com/.2003.
  • 5WONG F, STAJANO F. Location privacy in bluetooth[A]. 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks[C]. Visegrad (HU), 2005.176-188.
  • 6HAASE M, HANDY M. Bluetrack-imperceptible tracking of bluetooth devices[A]. UbiComp 2004[C]. Nottingham, England, 2004.
  • 7SOLON A, CALLAGHAN M, HARKIN J. Case Study on the bluetooth vulnerabilities in mobile devices[J]. International Journal of Computer Science and Network Security, 2006, 6(4): 125-129.
  • 8GEHRMANN C, NYBERG K. Enhancements to Bluetooth baseband security[A]. Proceedings of Nordsec 2001[C]. Copenhagen, Denmark, 2001.
  • 9Bluetooth SIG Specification of the Bluctooth System: Core Package version 2.1+EDR[S]. http://www.bluetooth.org. 2007.
  • 10李颖川,郁滨.蓝牙简单配对协议的安全性改进[A].全国第18届计算机技术与应用学术会议论文集[C].合肥,2007,1796-1799.

共引文献2

同被引文献11

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部