2012
DOI: 10.5120/7787-0884
|View full text |Cite
|
Sign up to set email alerts
|

An Integrated Scheme based on Triple DES, RSA and MD5 to Enhance the Security in Bluetooth Communication

Abstract: Data security is an important issue in data transmission through any type of network whether it is LAN, WAN, MAN or PAN. We are concentrating on PAN that is personal area network. Bluetooth is an example of this type of network. To provide the security in Bluetooth communication currently used encryption algorithm is a 128 bit symmetric stream cipher but symmetric cipher may be broken under certain condition. Another popularly used encryption algorithm for Bluetooth security are Data Encryption Standard (DES) … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…(Prakash & Purohit, 2013;Adedeji & Akinlolu, 2014). Likewise, Blowfish and Elliptic Curve Cryptography (ECC) were researched and merged (Patel et al, 2016;Chinnasamy et al, 2021), while DES, MD5, and RSA (Panse & Kapoor, 2012;Rani & Gangal, 2012) were studied and integrated in several publications. Several researchers have coupled RC4 and ECC (Tripathy et al, 2021;Tripathy et al 2021), and DES and ECC (Sharma & Chopra, 2017;Hoobi, 2020), to create hybrid encryption schemes.…”
Section: Resultsmentioning
confidence: 99%
“…(Prakash & Purohit, 2013;Adedeji & Akinlolu, 2014). Likewise, Blowfish and Elliptic Curve Cryptography (ECC) were researched and merged (Patel et al, 2016;Chinnasamy et al, 2021), while DES, MD5, and RSA (Panse & Kapoor, 2012;Rani & Gangal, 2012) were studied and integrated in several publications. Several researchers have coupled RC4 and ECC (Tripathy et al, 2021;Tripathy et al 2021), and DES and ECC (Sharma & Chopra, 2017;Hoobi, 2020), to create hybrid encryption schemes.…”
Section: Resultsmentioning
confidence: 99%
“…Completely aggregate data significance among linked devices to create a Piconet. [6]. Phreakers evaluat phones.…”
Section: How Does Bluetooth Compromise Security?mentioning
confidence: 99%
“…Karen et al [1] proposed a Bluetooth Security System that acts as a reference to organizations on security capabilities of Bluetooth and demonstrates steps for securing Bluetooth technology effectively. Nateq et al [2] and Trishna et al [3] worked on the same basis. Though Bluetooth technology [4] has innumerable benefits, it is also susceptible to denial-of-service attacks, eavesdropping, man-in-the-middle attacks [5], message modification, and resource misappropriation.…”
Section: Introductionmentioning
confidence: 99%