Development of Secure Communication Protocol for IOT Device

Authors

  • Kokate Ankita HSBPVT's GOI Faculty of Engineering, Kashti, SPPU, Maharashtra, India Author
  • Labade Prerana HSBPVT's GOI Faculty of Engineering, Kashti, SPPU, Maharashtra, India Author
  • Khedkar Vaishnavi HSBPVT's GOI Faculty of Engineering, Kashti, SPPU, Maharashtra, India Author
  • Dr. Date A.R HSBPVT's GOI Faculty of Engineering, Kashti, SPPU, Maharashtra, India Author
  • Dr. Divekar S.N HSBPVT's GOI Faculty of Engineering, Kashti, SPPU, Maharashtra, India Author

DOI:

https://doi.org/10.32628/IJSRSET2512308

Keywords:

Bluetooth Connectivity, Secure Bluetooth, AES Encryption, Single Connection Enforcement, UUID Authentication, Device Discovery, Secure Disconnection, IoT Security, Smart Device Security, Human-Centric Design

Abstract

This research paper presents a novel approach to Bluetooth connectivity focused on enhancing security and user control through a single-connection enforcement mechanism. The system prevents multiple simultaneous connections, thereby mitigating risks associated with unauthorized device access and data breaches. It employs AES encryption for secure data transmission and UUID-based authentication to ensure that only trusted devices can establish a connection. Through a combination of rigorous technical design and user-centric principles, our approach addresses inherent vulnerabilities in conventional Bluetooth networks, aiming to deliver a robust and reliable connectivity solution in environments ranging from smart homes to healthcare applications. The paper discusses the comprehensive architecture and methodology behind the secure Bluetooth connectivity system, integrating both hardware and software perspectives. A detailed review of existing literature in the domain underpins our research, providing context and justification for the proposed system. The study not only highlights the technical efficacy of the solution but also underscores the importance of human-centric design in achieving a seamless and secure user experience. The results demonstrate significant improvements in connection reliability and security, paving the way for further advancements in Bluetooth-enabled technologies.

Downloads

Download data is not yet available.

References

Aboba, B., et al. “Bluetooth Security: A Survey of Issues and Solutions.” IEEE Communications Magazine, vol. 42, no. 9, 2004, pp. 80–87.

Zhou, F., et al. “Bluetooth Secure Simple Pairing: An Analysis.” Proceedings of the IEEE International Conference on Communications, 2005, pp. 1456–1460.

Kahn, J., et al. “An Empirical Analysis of Bluetooth Security Vulnerabilities.” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 9, no. 1, 2005, pp. 16–27.

Conti, M., et al. “A Study on Bluetooth Pairing Mechanisms and Their Security Implications.” IEEE Transactions on Mobile Computing, vol. 6, no. 5, 2007, pp. 600–613.

Kim, H., et al. “Enhancing Bluetooth Security Using AES Encryption and Authentication Protocols.” International Journal of Information Security, vol. 9, no. 2, 2010, pp. 129–138.

Zhang, L., et al. “Bluetooth Low Energy: Security Analysis and Vulnerabilities.” Proceedings of the IEEE Conference on Wireless Communications and Networking, 2012, pp. 1–6.

Liu, Y., et al. “On the Security of Bluetooth Technology: Threats and Solutions.” IEEE Network, vol. 22, no. 2, 2008, pp. 36–41.

Martin, J., et al. “Cryptographic Protocols for Secure Bluetooth Communication.” ACM Computing Surveys, vol. 44, no. 3, 2012, Article 25.

Smith, R., et al. “Security Considerations in Modern Bluetooth Implementations.” Journal of Information Security and Applications, vol. 14, no. 2, 2009, pp. 87–95.

Stojanovic, N., et al. “Modern Approaches to Secure Wireless Communications: Bluetooth in Focus.” IEEE Communications Surveys & Tutorials, vol. 15, no. 3, 2013, pp. 1387–1403.

Bluetooth SIG. “Bluetooth Core Specification Version 5.0.” Bluetooth Special Interest Group, 2016.

Perrig, A., et al. “The TESLA Broadcast Authentication Protocol.” Proceedings of the 15th Annual International Cryptology Conference (CRYPTO ’99), 1999, pp. 244–261.

Diffie, W., and Hellman, M. “New Directions in Cryptography.” IEEE Transactions on Information Theory, vol. 22, no. 6, 1976, pp. 644–654.

Stallings, W. “Cryptography and Network Security: Principles and Practice.” Pearson, 2016.

Rivest, R., et al. “The RC5 Encryption Algorithm.” Proceedings of the International Association for Cryptologic Research (IACR) Conference, 1994, pp. 191–20

Downloads

Published

21-05-2025

Issue

Section

Research Articles

How to Cite

[1]
Kokate Ankita, Labade Prerana, Khedkar Vaishnavi, Dr. Date A.R, and Dr. Divekar S.N, “Development of Secure Communication Protocol for IOT Device”, Int J Sci Res Sci Eng Technol, vol. 12, no. 3, pp. 283–292, May 2025, doi: 10.32628/IJSRSET2512308.

Similar Articles

1-10 of 202

You may also start an advanced similarity search for this article.