Skip to main content

Intelligent Hybrid Technique to Secure Bluetooth Communications

Part of the Advances in Intelligent Systems and Computing book series (AISC,volume 1333)


E0 algorithm is the most popular which used for data transmission Bluetooth communication among devices. E0 is having a 128-bit of symmetric stream cipher key length. Many types of attacks at Bluetooth protocol and cryptanalysis of E0 has proved that it would be broken by using 264 operations. In this work, we have proposed hybrid encryption based on blowfish and md5 algorithms to im-prove the security of transferring data between two computers connected using Bluetooth technique. Because of the advantages of key management of the MD5 algorithm, we used it to encrypt the secret key of Blowfish algorithm which used for encryption of plaintext. Therefore, the proposed hybrid encryption (Blowfish and MD5) will positively improve the data security during communication in Bluetooth media.


  • Bluetooth
  • Encryption algorithms
  • E0 algorithm
  • MD5 algorithm
  • Blowfish

This is a preview of subscription content, access via your institution.

Buying options

USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions


  1. Suhonen, J., Kohvakka, M., Kaseva, V., Hämäläinen, T. D., Hännikäinen, M.: Low-power wireless sensor networks: protocols, services and applications. Springer Science & Business Media (2012)

    Google Scholar 

  2. Shorey, R., Miller, B. A.: The Bluetooth technology: merits and limitations. In: 2000 IEEE International Conference on Personal Wireless Communications. Conference Proceedings (Cat. No. 00TH8488, pp. 80–84 IEEE

    Google Scholar 

  3. Pering, T., Agarwal, Y., Gupta, R., Want, R.: Coolspots: reducing the power consumption of wireless mobile devices with multiple radio interfaces. In: Proceedings of the 4th international conference on Mobile systems, applications and services, pp. 220–232, ACM (2006)

    Google Scholar 

  4. Want, R., Schilit, B.N., Jenson, S.: Enabling the internet of things. Computer 1, 28–35 (2015)

    CrossRef  Google Scholar 

  5. Bokhari, M. U., Makki, Q., Tamandani, Y. K.: A survey on cloud computing. In: Big Data Analytics, pp. 149–164, Springer, Singapore (2018)

    Google Scholar 

  6. Patheja, P. S., Waoo, A. A., &Nagwanshi, S.: A hybrid encryption technique to secure Bluetooth communication. In: IJCA Proceedings on International Conference on Computer Communication and Networks, Vol. 1, pp. 26–32

    Google Scholar 

  7. Panse, T., Kapoor, V.: A review on security mechanism of Bluetooth communication. Int. J. Comput. Sci. Inf. Technol. 3(2), 3419–3422 (2012)

    Google Scholar 

  8. Bokhari, M. U., Shallal, Q. M.: A review on symmetric key encryption techniques in cryptography. Int. J. Comput. Appl. 147(10) (2016)

    Google Scholar 

  9. Shon, T., Choi, W.: An analysis of mobile WiMAX security: vulnerabilities and solutions. In: International Conference on Network-Based Information Systems (pp. 88–97). Springer, Berlin, Heidelberg (2007)

    Google Scholar 

  10. Bokhari, M. U., Shallal, Q. M., Tamandani, Y. K.: Security and privacy issues in cloud computing. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 896–900). IEEE (2016)

    Google Scholar 

  11. Mavrogiannopoulos, N.: On bluetooth security. December 2005 (2005)

    Google Scholar 

  12. Hubaux, J.P., Capkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Secur. Priv. 3, 49–55 (2004)

    CrossRef  Google Scholar 

  13. Persson, K. E., Manivannan, D.: Secure connections in bluetoothscatternets. In: 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, pp. 10, IEEE (2003)

    Google Scholar 

  14. Gehrmann, C., Persson, J., Smeets, B.: Bluetooth security. Artech house (2004)

    Google Scholar 

  15. Rege, K., Goenka, N., Bhutada, P., Mane, S.: Bluetooth communication using hybrid encryption algorithm based on AES and RSA. Int. J. Comput. Appl. 71(22) (2013)

    Google Scholar 

  16. Bokhari, M. U., Shallal, Q. M., Zeyauddin, M.: Hybrid Blowfish and RSA Algorithms to Secure Data between Cloud Server and Client

    Google Scholar 

  17. Bansal, V. P., Singh, S.: A hybrid data encryption technique using RSA and Blowfish for cloud computing on FPGAs. In: 2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS), pp. 1–5, IEEE (2015)

    Google Scholar 

  18. Jianghua, L.: MD5-Base64 based hybrid encryption algorithm. J. Comput. Appl. 32, 47–49 (2012)

    Google Scholar 

  19. Chauhan, A., Gupta, J.: A novel technique of cloud security based on hybrid encryption by Blowfish and MD5. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), pp. 349–355, IEEE (2017)

    Google Scholar 

  20. Bokhari, M.U., Shallal, Q.M., Tamandani, Y.K.: Reducing the required time and power for data encryption and decryption using K-NN machine learning. IETE J. Res. 65(2), 227–235 (2019)

    CrossRef  Google Scholar 

  21. Bokhari, M. U., Shallal, Q. M.: Evaluation of hybrid encryption technique to secure data during transmission in cloud computing. Int. J. Comput. Appl. 166(4) (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Qahtan Makki Shallal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abbood, A.A., Shallal, Q.M., Jabbar, H.K. (2021). Intelligent Hybrid Technique to Secure Bluetooth Communications. In: Bhattacharyya, S., Mršić, L., Brkljačić, M., Kureethara, J.V., Koeppen, M. (eds) Recent Trends in Signal and Image Processing. ISSIP 2020. Advances in Intelligent Systems and Computing, vol 1333. Springer, Singapore.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-33-6965-8

  • Online ISBN: 978-981-33-6966-5

  • eBook Packages: EngineeringEngineering (R0)