Abstract
E0 algorithm is the most popular which used for data transmission Bluetooth communication among devices. E0 is having a 128-bit of symmetric stream cipher key length. Many types of attacks at Bluetooth protocol and cryptanalysis of E0 has proved that it would be broken by using 264 operations. In this work, we have proposed hybrid encryption based on blowfish and md5 algorithms to im-prove the security of transferring data between two computers connected using Bluetooth technique. Because of the advantages of key management of the MD5 algorithm, we used it to encrypt the secret key of Blowfish algorithm which used for encryption of plaintext. Therefore, the proposed hybrid encryption (Blowfish and MD5) will positively improve the data security during communication in Bluetooth media.
Keywords
- Bluetooth
- Encryption algorithms
- E0 algorithm
- MD5 algorithm
- Blowfish
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Suhonen, J., Kohvakka, M., Kaseva, V., Hämäläinen, T. D., Hännikäinen, M.: Low-power wireless sensor networks: protocols, services and applications. Springer Science & Business Media (2012)
Shorey, R., Miller, B. A.: The Bluetooth technology: merits and limitations. In: 2000 IEEE International Conference on Personal Wireless Communications. Conference Proceedings (Cat. No. 00TH8488, pp. 80–84 IEEE
Pering, T., Agarwal, Y., Gupta, R., Want, R.: Coolspots: reducing the power consumption of wireless mobile devices with multiple radio interfaces. In: Proceedings of the 4th international conference on Mobile systems, applications and services, pp. 220–232, ACM (2006)
Want, R., Schilit, B.N., Jenson, S.: Enabling the internet of things. Computer 1, 28–35 (2015)
Bokhari, M. U., Makki, Q., Tamandani, Y. K.: A survey on cloud computing. In: Big Data Analytics, pp. 149–164, Springer, Singapore (2018)
Patheja, P. S., Waoo, A. A., &Nagwanshi, S.: A hybrid encryption technique to secure Bluetooth communication. In: IJCA Proceedings on International Conference on Computer Communication and Networks, Vol. 1, pp. 26–32
Panse, T., Kapoor, V.: A review on security mechanism of Bluetooth communication. Int. J. Comput. Sci. Inf. Technol. 3(2), 3419–3422 (2012)
Bokhari, M. U., Shallal, Q. M.: A review on symmetric key encryption techniques in cryptography. Int. J. Comput. Appl. 147(10) (2016)
Shon, T., Choi, W.: An analysis of mobile WiMAX security: vulnerabilities and solutions. In: International Conference on Network-Based Information Systems (pp. 88–97). Springer, Berlin, Heidelberg (2007)
Bokhari, M. U., Shallal, Q. M., Tamandani, Y. K.: Security and privacy issues in cloud computing. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 896–900). IEEE (2016)
Mavrogiannopoulos, N.: On bluetooth security. December 2005 (2005)
Hubaux, J.P., Capkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Secur. Priv. 3, 49–55 (2004)
Persson, K. E., Manivannan, D.: Secure connections in bluetoothscatternets. In: 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, pp. 10, IEEE (2003)
Gehrmann, C., Persson, J., Smeets, B.: Bluetooth security. Artech house (2004)
Rege, K., Goenka, N., Bhutada, P., Mane, S.: Bluetooth communication using hybrid encryption algorithm based on AES and RSA. Int. J. Comput. Appl. 71(22) (2013)
Bokhari, M. U., Shallal, Q. M., Zeyauddin, M.: Hybrid Blowfish and RSA Algorithms to Secure Data between Cloud Server and Client
Bansal, V. P., Singh, S.: A hybrid data encryption technique using RSA and Blowfish for cloud computing on FPGAs. In: 2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS), pp. 1–5, IEEE (2015)
Jianghua, L.: MD5-Base64 based hybrid encryption algorithm. J. Comput. Appl. 32, 47–49 (2012)
Chauhan, A., Gupta, J.: A novel technique of cloud security based on hybrid encryption by Blowfish and MD5. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), pp. 349–355, IEEE (2017)
Bokhari, M.U., Shallal, Q.M., Tamandani, Y.K.: Reducing the required time and power for data encryption and decryption using K-NN machine learning. IETE J. Res. 65(2), 227–235 (2019)
Bokhari, M. U., Shallal, Q. M.: Evaluation of hybrid encryption technique to secure data during transmission in cloud computing. Int. J. Comput. Appl. 166(4) (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Abbood, A.A., Shallal, Q.M., Jabbar, H.K. (2021). Intelligent Hybrid Technique to Secure Bluetooth Communications. In: Bhattacharyya, S., Mršić, L., Brkljačić, M., Kureethara, J.V., Koeppen, M. (eds) Recent Trends in Signal and Image Processing. ISSIP 2020. Advances in Intelligent Systems and Computing, vol 1333. Springer, Singapore. https://doi.org/10.1007/978-981-33-6966-5_14
Download citation
DOI: https://doi.org/10.1007/978-981-33-6966-5_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-6965-8
Online ISBN: 978-981-33-6966-5
eBook Packages: EngineeringEngineering (R0)