Open Access
Subscription Access
Fortifying Connectivity: A Hybrid Algorithm Approach for Augmented Security and Efficiency in Bluetooth Technology
Bluetooth technology has become an integral part of our daily lives, providing wireless connectivity and seamless communication between wide ranges of devices. Bluetooth uses a master-slave architecture, where one device acts as the master, and the other devices act as slaves. The master device initiates and controls the connection, while the slave devices respond to connection requests from the master. In this research we are enhancing the security and efficiency of Bluetooth technology using hybrid approached algorithm i.e., combination of Two fish and ElGamal algorithm for making the communication process more secure and protected from foreign access. This research paper proposes a novel approach to enhance Bluetooth security by applying a hybrid algorithm that combines the strengths of Two fish and ElGamal encryption schemes. Two fish, a symmetric-key algorithm known for its high-speed data processing and resistance to attacks, will provide the foundation for encrypting data during Bluetooth communication. Concurrently, ElGamal, a public-key algorithm celebrated for its robust security and strong cryptographic properties, will complement the hybrid approach by ensuring secure key exchange between devices. The fusion of Two fish and ElGamal aims to overcome the limitations of using either algorithm in isolation, while capitalizing on their respective advantages to form a more potent and reliable security solution. By employing Two fish for efficient data encryption and ElGamal for secure key exchange, we anticipate a formidable defense against various attack vectors, including eavesdropping, man-in-the-middle attacks, and brute-force attempts.
Keywords
Bluetooth, Architecture, Related Work, Versions, Two fish algorithm, ElGamal Algorithm, Conclusion.
User
Font Size
Information
- Hamouda, Baha Eldin, https://www.researchgate.net/publication/341936439_Comparative_Study_of_Different_Cryptographic_Algorithms, Journal of information security,DOI:10.4236/jis.2020.113009.
- TANVEER UL HAQ 1 , TARIQ SHAH 1, Improved Twofish Algorithm: A Digital Image Enciphering Application,IEEE, Doi: 10.1109/ACCESS.2021.3081792.
- https://www.researchgate.net/publication/325792828_Performance_Evaluation_of_Twofish_Algorithm_on_IMAN1_Supercomputer, June 2018International Journal of Computer Applications 179(50):1-7,DOI:10.5120/ijca2018916654
- E.Jeevalatha, Mr.S.SenthilMurugan, Evolution of AES, Blowfish and Two fish Encryption Algorithm, International Journal of Scientific & Engineering Research Volume 9, Issue 4, April-2018 ISSN 2229-5518, DOI:10.13140/RG.2.2.31024.38401
- Thomas Willingham, Cody Henderson, Blair Kiel, Md Shariful Haque, and Travis Atkison. 2018. Testing Vulnerabilities in Bluetooth Low Energy. In ACM SE ’18: ACM SE ’18: Southeast Conference, March 29–31, 2018, Richmond, KY, USA. ACM, New York, NY, USA, Article 4, 7 pages. https://doi.org/10.1145/ 3190645.3190693.
- https://www.researchgate.net/publication/326511381_Security_Vulnerabilities_in_Bluetooth_Technology_as_Used_in_IoTJ. Sens. Actuator Netw. 2018, 7(3), 28; https://doi.org/10.3390/jsan7030028
- Albahar, M.A., Olawumi, O., Haataja, K. and Toivanen, P. (2018) Novel Hybrid Encryption Algorithm Based on Aes, RSA, and Two fish for Bluetooth Encryption. Journal of Information Security, 9, 168-176. https://doi.org/10.4236/jis.2018.92012.
- Sun DZ, Sun L, Yang Y. On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy. Sensors (Basel). 2019 Jul 24;19(15):3259. doi: 10.3390/s19153259. PMID: 31344911; PMCID: PMC6696427.Sensors 2019, 19(15), 3259; https://doi.org/10.3390/s19153259
- [9] Levinia B. Rivera, Jazzmine A. Bay, Edwin R. Arboleda, Hybrid Cryptosystem Using RSA, DSA, Elgamal, And AES, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 10, OCTOBER 2019, https://www.researchgate.net/publication/336818536_Hybrid_Cryptosystem_Using_RSA_DSA_Elgamal_And_AES.
- Anil G. Sawant, 2 Dr. Vilas N. Nitnaware, TWOFISH ALGORITHM FOR ENCRYPTION AND DECRYPTION, JETIR, https://www.jetir.org/papers/JETIRW006063.pdf.
- K I Santoso, M A Muin and M A Mahmudi, Implementation of AES cryptography and two fish hybrid algorithms for cloud, DOI 10.1088/1742-6596/1517/1/012099, Journal of Physics: Conference Series, Volume 1517, 2019 1st Borobudur International Symposium on Applied Science and Engineering (BIS-ASE) 2019 16 October 2019, Magellan, Indonesia Citation K I Santoso et al 2020 J. Phys.: Conf. Ser. 1517 012099
- Ms.S. Selvakumari, Comparative Study on Blowfish & Two fish Algorithms in Iot Applications, https://www.academia.edu/42794395/Comparative_Study_on_Blowfish_and_Twofish_Algorithms_in_Iot_Applications
- K. Lounis and M. Zulkarnaen, "Attacks and Defenses in Short-Range Wireless Technologies for IoT," in IEEE Access, vol. 8, pp. 88892-88932, 2020, doi: 10.1109/ACCESS.2020.2993553.DOI: 10.1109/ACCESS.2020.2993553
- Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen. 2020. Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy. ACM Trans. Priv. Secure. 23, 3, Article 14 (June 2020), 28 pages. https://doi.org/10.1145/3394497
- Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi, https://tubiblio.ulb.tu-darmstadt.de/id/eprint/126124
- Anjan K Koundinya, Two-Layer Encryption based on Paillier and ElGamal Cryptosystem for Privacy Violation, I.J. Wireless and Microwave Technologies, 2021, 3, 9-15 Published Online June 2021 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijwmt.2021.03.02
- Bilal Hashim Hameed, Anmar Yahya Taher, Raed Khalid Ibrahim, Adnan Hussein Ali, Yasser Adnan Hussein, DOI: http://doi.org/10.11591/ijeecs.v26.i3.pp1781-1790
- Haneen Abdulrazak, Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Two fish, and Threefish, DOI: https://doi.org/10.17762/ijcnis.v14i1.5262, https://www.ijcnis.org/index.php/ijcnis/article/view/5262
- Akash Thakkar1, Ravi Gor2, Cryptographic method to enhance the Data Security using ElGamal algorithm and Kamal Transform, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 24, Issue 3, Ser. III (May. –June. 2022), PP 08-14 www.iosrjournals.org, https://www.iosrjournals.org/iosr-jce/papers/Vol24-issue3/Ser-3/B2403030814.pdf
- AKSA Anudini, G. Gayamini, and Prof. Thushara Weerawardane (2022); Cloud Data Security System Using Cryptography and Steganography: A Review; International Journal of Scientific and Research Publications (IJSRP) 12(9) (ISSN: 2250-3153), DOI: http://dx.doi.org/10.29322/IJSRP.12.09.2022.p12936
- Emmanuel A. Adeniyi, Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions, Information 2022, 13(10), 442; https://doi.org/10.3390/info13100442
Abstract Views: 96
PDF Views: 38