Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

A Survey over the Security Issues of Bluetooth using Elliptic Curve Cryptography

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Ahmed Hweishel A. Alfarjat, Hanumanthappa J.

Ahmed Hweishel A Alfarjat and Hanumanthappa J.. A Survey over the Security Issues of Bluetooth using Elliptic Curve Cryptography. International Journal of Computer Applications 150(8):14-17, September 2016. BibTeX

	author = {Ahmed Hweishel A. Alfarjat and Hanumanthappa J.},
	title = {A Survey over the Security Issues of Bluetooth using Elliptic Curve Cryptography},
	journal = {International Journal of Computer Applications},
	issue_date = {September 2016},
	volume = {150},
	number = {8},
	month = {Sep},
	year = {2016},
	issn = {0975-8887},
	pages = {14-17},
	numpages = {4},
	url = {},
	doi = {10.5120/ijca2016911591},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The ECC is the latest and fastest encryption method which offers stronger security. As it is known that although a vast majority of devices currently now communicates using Bluetooth methodology, the blue tooth security expert provides automatic updates to its security protocol and user privacy protection techniques. Further protection of the device user’s personal information becomes the primary aim. The research work also explores the Bucket Brigade Attack on Bluetooth security using Elliptic Curve Cryptography (ECC). Also it is implied that Bucket Brigade Attack(BBA) is one of the amazing solution to the problem of key agreement or key swapping. Further the beauty of this scheme is when two parties who likes to communicate using symmetric key and an Elliptic Curve Cryptography(ECC) an Intruder(Hacker) enters in between a sender and a receiver. This paper is an attempt to implement the ECC after a survey over the current issues on security.


  1. W.Diffie and M.Hellman,New directions in Cryptography,IEEE Transactions on information Theory,Vol.22(1976),pp.644-654.
  2. Bluetooth SIG:Bluetooth Wireless Technology Surpasses One billion devices.
  3. Tan A:Bluetooth gets high speed boost.CNET Networks,ZDNet Asia,newscopy march 9,2006.
  4. Suomalainen.J., all:Security Associations in Personal Networks–A Comparative Analysis .Proceedings of the fourth European workshop on Security and Privacy in Ad-hoc and Sensor Networks(ESAS-2007),LNCS,Vol.4572,springer-verlog,pp.43-57.
  5. William Stallings:Cryptography and Network Security Principles and Practice.3rd Edition,Upper saddle river, New jersey,PH,2003.
  6. Spill .D. and Bittau.A.:Bluetooth–Eve meets Alice and Bluetooth,Proceedings of the first Usenix workshop on offensive technologies(WOOT-2007),Boston,MA,2007.
  7. Rivest .R.,Shamir.A. and Adleman.L.:A Method for obtaining Digital Signatures and Public Key Cryprosystems,Communications of the ACM,Vol.21,No.2,Feb,1978,pp-120-126.
  8. Borisov.N.,Goldberg.I.,and Wagner.D.,Intercepting mobile communications the insecurity on 802.11 Proceedings of the 7th Annual International Conference on mobile computing and Networking,ACM Press,2001.
  9. Bluetooth SIG:Bluetooth Wireless Technology Surpasses one Billion Devices,Bluetooth SIG,press release,Nov.13,2006.
  10. D.Kugler,Man in the Middle attacks on Bluetooth,in Proc 7th International Conference Financial Cryptography(FC’03),Gosier,Goudeloupe,French West Indies,Jan.27-30,2003,pp.149-161.
  11. M.S.Hwang,C.C.Lee,J.Z.Lee et al,A Secure Protocol for Bluetooth piconet’s using Elliptic Curve Cryptography,Telecommunication systems,vol.29,no.3,pp-165-180,2005.
  12. C.T.Hager and S.F.Midkiff,An Analysis of Bluetooth Security vulnerabilities in Proc Wireless IEEE Communication and Networking Conference(WCNC-2003),New Orleans,LA,USA,Mar-16-20,pp-1825-1831.
  13. D.Bae,J.Kim,S.Park and O.Song,Design and Implementation of IEEE 802.11i architecture for next generation WLAN in Proc 1st SKLOIS Conf Information Security and Cryptology(CISC-2005),Beijing China,Dec 15-17,Springer verlog,pp.346-357.
  14. W.C.Barker,Recommendation for the triple data encryption algorithm block cipher,National Institute of standards and Technology(NIST),Gaithersburg,MD,USA.
  15. S.Das,F.Anjum,Y.ohba et al,Security issues in Wireless IP networks in Mobile internet:Enabling Technologies and Services.
  16. E.B.Fernandez,S.Rajput,M.Vanhilst,Some Security issues of Wireless systems,Jan 24-28,2005.
  17. M.Jakobsson,S.Wetzel,Security weaknesses in Bluetooth.LNCS,Vol.2020,pp.16-191,springer-verlag,2001.
  18. Hypponen.K.,Haataja.K.,”Nino” Man in the Middle Attack on Bluetooth Secure Simple pairing,proceedings of the IEEE Third International Conference in Central Asia on Internet,The next Generation of Mobile,Wireless networks and Optical communications Networks(ICI-2007),Tashkent,Uzbekistan,Sept 26-28,2007.
  19. K.Kurosawa,K.Okada and S.Tsujii,”Low exponent attack against elliptic curve RSA,Advances in Cryptology”-ASIACRYPT-94,Lecture notes in Computer Science,Springer-Verlag,917(1995),pp.376-383.
  20. Koyama.K.,Maurer.U.,Okam oto.T.,S.Vanstone,New Public Key Scheme based on elliptic curves over the ring Zn,Advances in Cryptology-CRYPTO-91,Lecture notes in Computer Science,Springer-Verlag,576(1993)pp.252-
  21. Ahmed Hweishel A.Alfarjat,Hanumanthappa.J.,”A Survey over the Security issues of Bluetooth using Elliptic Curve Cryptography”,International Journal of Computer Applications.
  22. V.Miller,”Uses of Elliptic Curves in Cryptography,Advances in Cryptology-CRYPTO-85,Lecture notes in Computer Science,Springer-Verlag,218(1986),pp.417-426.
  23. Koblitz.N.,Elliptic Curve Cryptosystems,Mathematics of Computation,48(177):203-209,1987.