Monday, 16 September 2019

Security Enhancement in Bluetooth Hybrid Ring Topology (BLU-HRT) using Elliptic Curve Cryptography

Volume 6 Issue 1 April - June 2017

Research Paper

Security Enhancement in Bluetooth Hybrid Ring Topology (BLU-HRT) using Elliptic Curve Cryptography

*, J. Rajendra Prasad**, R. Kiran Kumar***
* Assistant Professor, Department of Computer Applications, PVP Siddhartha Institute of Technology, Vijayawada, India.
** Professor, Department of Information Technology, PVP Siddhartha Institute of Technology, Vijayawada, Andhra Pradesh, India.
*** Assistant Professor, Department of Computer Science, Krishna University, Machilipatnam, India.
Sri, T.S., Prasad, J.R., and Kumar, R.K. (2017). Security Enhancement in Bluetooth Hybrid Ring Topology (BLU-HRT) using Elliptic Curve Cryptography. i-manager’s Journal on Wireless Communication Networks, 6(1), 12-21. https://doi.org/10.26634/jwcn.6.1.13771

Abstract

Scatternet development and its routing are significant issues for the upcoming Bluetooth technologies. Likewise, security is also one of the significant issues. The security in the Bluetooth Scatternet construction is foremost aspect to assure the usage of Bluetooth network. BlueHRT (Bluetooth Hybrid Ring Topology) is a scatternet that works on the uneven dissemination of devices. The BlueHRT is a composition of ring of trees and it is envisioned to amalgamate the advantages of both BlueRing and BlueTree and instantaneously conflicts its restrictions. So as to overwhelm this issue of Un-Authentication and provide Confidentiality on the data packets of Scatternet Topology, this paper introduced the novel security enhancement to the existing Bluetooth Hybrid Ring Topology at the time of routing the data between one nodes to other node by means of Elliptic Curve Cryptography technique. ECC is a technique in public-key cryptography depending on the arithmetic procedure of elliptic curves over the limited areas. The experimental results showed that this suggested approach has better performance in terms of packet delivery fraction, Communication Overhead, and percentage of packets dropped that moved over malicious node compared with the existing BlueHRT technique.

No comments:

Post a Comment