Open Access Open Access  Restricted Access Subscription Access

Securities Control in Ad Hoc Network on Scatternet

Shubham Patel, Rajendra Singh

Abstract


This study presents and evaluates an ad hoc network formatting algorithm. The algorithm is discussed to feature the specifications of Bluetooth under a designed purpose, a limited range device with a host and numbers of connected devices wirelessly. There are many research and analyses done till today’s date for the selection of secured devices. Proposed solutions have been evaluated utilizing the Open Web Application Security Project (OWASP). Nowadays, Bluetooth is a widely used technology. It is a LAN, or regional area network/Personal area network (PAN). The eventual goal does not specify how Bluetooth-enabled products find each other and establish a scatternet in specific terms. Instead, how a formed scatternet allows any two Bluetooth enabled devices to communicate with each other. This algorithm is a concept to secure the passage through which the data is transmitted over the connecting devices. We have security for connecting the Bluetooth devices with each other but least about the data. So, there should be a secured channel to transmit the data within the connected devices. The presented algorithm concept results in securing the channel. Researchers have done research and analysis on data link layer and physical layer of OSI Model, but we think it can be much effective on network layer. Hence, the proposed solution is on the network layer. The above component is a part of the Bluetooth protocol stack’s L2CAP layer. These technology devices use chunk of power sources called battery. So, when we work on energy efficiency to reduce the consumption of power and increase the life of the device, it will assist to maintain the connectivity among the devices/nodes. Thus, the security will be undisturbed, and data would be transmitted securely.


Keywords


OSI, PAN, network, algorithm, TSF, L2CAP layer

Full Text:

PDF

References


Indrek Taal, Security Risk Analysis of Wireless Mesh Network for Emergency Networks. Diploma Thesis. School of Information Technologies, Tallinn University of Technology; 2020.

Hoebeke J, Moerman I, Dhoedt B, Demeester P. An overview of mobile ad hoc networks: applications and challenges. Journal-Communications Network (JCN). 2004 Jul 1; 3(3): 60–6.

Medidi M, Zhou Y. Maintaining an energy-efficient bluetooth scatternet. In 2006 IEEE International Performance Computing and Communications Conference. 2006.

Cherepy NJ, Fiederle M, James RB. Hard X-Ray, Gamma-Ray, and Neutron Detector Physics XXIII. In Proc. of SPIE. 2021 Sep; 11838: 1183801-1.

Pamuk C, Karasan E. SF-DeviL: an algorithm for energy-efficient Bluetooth scatternet formation and maintenance. Comput Commun. 2005 Jun 16; 28(10): 1276–91.

Wikipedia. Wireless ad hoc network. [Online]. Available from https://en.wikipedia.org/wiki/Wireless_ad_hoc_network.

KITZ. Re: Are BT throttling connections? [Online]. Available from https://forum.kitz.co.uk/index.php?topic=14739.60.

Salonidis T, Bhagwat P, Tassiulas L, LaMaire R. Distributed topology construction of Bluetooth wireless personal area networks. IEEE J Sel Areas Commun. 2005 Mar 7; 23(3): 633–43.

Petrioli C, Basagni S, Chlamtac I. BlueMesh: Degree-constrained multi-hop scatternet formation for Bluetooth networks. Mob Netw Appl. 2004 Feb; 9(1): 33–47.

Zaruba GV, Basagni S, Chlamtac I. Bluetrees-scatternet formation to enable Bluetooth-based ad hoc networks. In ICC 2001, IEEE International Conference on Communications. Conference Record (Cat. No. 01CH37240). 2001 Jun 11; 1: 273–277.

Philip Winn. Dictionary of Biological Psychology. Routledge; 2001.

Medidi M, Campbell J. Energy-efficient bounded-diameter tree scatternet for bluetooth pans. InThe IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05) l 2005 Nov 17 (pp. 268-275). IEEE.

Hoebeke Jeroen, Moerman Ingrid, Dhoedt Bart, Demeester Piet. An overview of mobile ad hoc networks: Applications and challenges. Journal-Communications Network (JCN). 2004; 3(3): 60–66.

Tan G, Miu A, Guttag J, Balakrishnan H. An efficient scatternet formation algorithm for dynamic environments. Proceedings of the IASTED communications and computer networks (CCN). 2002.

Law C, Siu KY. A Bluetooth scatternet formation algorithm. InGLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No. 01CH37270) 2001 Nov 25 (Vol. 5, pp. 2864-2869). IEEE.

Ramachandran L, Kapoor M, Sarkar A, Aggarwal A. Clustering algorithms for wireless ad hoc networks. In Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communications 2000 Aug 1 (pp. 54-63).

H. Zhang, J. C. Hou, and L. Sha, “Bluetooth loop scatternet formation algorithm,” in IEEE ICC, 2003, pp. 1174–1180.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517