Hardware Implementation of Bluetooth Security

  • Authors:
  • Paraskevas Kitsos;Nicolas Sklavos;Kyriakos Papadomanolakis;Odysseas Koufopavlou

  • Affiliations:
  • -;-;-;-

  • Venue:
  • IEEE Pervasive Computing
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

The authors present a hardware implementation of the Bluetooth system security layer. The Bluetooth security layer includes key-generating mechanisms, authentication, and data encryption. The first two can be implemented in software or hardware. For applications where the processing time is not critical, the software implementation usually satisfies user requirements. However, in time-critical applications requiring a fast connection and in devices with processing constraints, the hardware implementation is preferable.