Research and design of the protection scheme on bluetooth location privacy

The attack mechanism of bluetooth location privacy and the disadvantages of the current protection scheme were analyzed and a model of hierarchical address was established.On the basis of the model,a protection scheme on bluetooth location privacy was designed.Compared with others,this scheme can no...

Full description

Saved in:
Bibliographic Details
Main Authors: YU Bin, ZHANG Shun
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74421239/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537770763321344
author YU Bin
ZHANG Shun
author_facet YU Bin
ZHANG Shun
author_sort YU Bin
collection DOAJ
description The attack mechanism of bluetooth location privacy and the disadvantages of the current protection scheme were analyzed and a model of hierarchical address was established.On the basis of the model,a protection scheme on bluetooth location privacy was designed.Compared with others,this scheme can not only resist eavesdroping,replay attack,frequency hop sequence attack,conversation address tracking attack,dictionary attack and man in the middle attack,but also need little computing and storage.
format Article
id doaj-art-28cb082e3a5d4e14b2762175d69ba95a
institution Kabale University
issn 1000-436X
language zho
publishDate 2011-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-28cb082e3a5d4e14b2762175d69ba95a2025-01-14T08:23:31ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-013211612274421239Research and design of the protection scheme on bluetooth location privacyYU BinZHANG ShunThe attack mechanism of bluetooth location privacy and the disadvantages of the current protection scheme were analyzed and a model of hierarchical address was established.On the basis of the model,a protection scheme on bluetooth location privacy was designed.Compared with others,this scheme can not only resist eavesdroping,replay attack,frequency hop sequence attack,conversation address tracking attack,dictionary attack and man in the middle attack,but also need little computing and storage.http://www.joconline.com.cn/zh/article/74421239/Bluetoothlocation privacyhierarchical addresspaging connection protocol
spellingShingle YU Bin
ZHANG Shun
Research and design of the protection scheme on bluetooth location privacy
Tongxin xuebao
Bluetooth
location privacy
hierarchical address
paging connection protocol
title Research and design of the protection scheme on bluetooth location privacy
title_full Research and design of the protection scheme on bluetooth location privacy
title_fullStr Research and design of the protection scheme on bluetooth location privacy
title_full_unstemmed Research and design of the protection scheme on bluetooth location privacy
title_short Research and design of the protection scheme on bluetooth location privacy
title_sort research and design of the protection scheme on bluetooth location privacy
topic Bluetooth
location privacy
hierarchical address
paging connection protocol
url http://www.joconline.com.cn/zh/article/74421239/
work_keys_str_mv AT yubin researchanddesignoftheprotectionschemeonbluetoothlocationprivacy
AT zhangshun researchanddesignoftheprotectionschemeonbluetoothlocationprivacy