The paper proposes a new Bluetooth security architecture based on user authentication and chaotic image encryption. The algorithm is able to overcome man in middle attack as well as privacy for image is ensured using a fast encryption algorithm based on chaotic encryption. Chaotic encryption produces the key using a pseudorandom number generator. It is a stream cipher method. © 2011 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Philip, M., & Das, A. (2011). A new bluetooth security architecture. In Communications in Computer and Information Science (Vol. 204 CCIS, pp. 507–515). https://doi.org/10.1007/978-3-642-24043-0_51
Mendeley helps you to discover research relevant for your work.