Authenticated Data Scrambler and Descrambler for Advanced Bluetooth devices

نویسندگان

  • A. Kirthanaa
  • N. Mathan
  • T. Ravi
چکیده

Each network device or portable device with HOST interface (radio or cable) has several hierarchical structures which distribute functionality between different layers of that device. The hierarchy defined radio interface, base band layer. During development of the Bluetooth module, a new complex architecture is integrated; it supports low cost upgrades related to new generations of Bluetooth devices. This paper presents the Bluetooth technology and its architecture. The base band layer performs the functions related to interface interaction between the Bluetooth chipset and an external or integrated radio chip and a host system. In base band, different modules for data processing are integrated, like modules for generating scrambling base band module of blue tooth. The development of the module has been done with hardware description language VHDL. This permitted us to perform top level functional verification and debugging, as well as detailed subsystem simulations throughout the design process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Synchronization of shift register generators in general distributed sample scramblers

In this paper, a theory is developed to support the synchronization of shift register generators (SRG’s) in the general class of distributed sample scramblers (DSS’s). In the general DSS, the samples transmitted to the descrambler for its synchronization are freely generated out of the scrambler SRG, a special case of which is to take samples directly from the SRG sequence. To describe this gen...

متن کامل

Efficient Mutual Data Authentication Using Manually Authenticated Strings

Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short range wireless communication. All such key exchange protocols employ data authentication as an unavoidable subtask. As a solution, we propose an asymptotically optimal protocol family for data authentication that uses short man...

متن کامل

Efficient Mutual Data Authentication Using Manually Authenticated Strings: Extended Version

Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short range wireless communication. All such key exchange protocols employ data authentication as an unavoidable subtask. As a solution, we propose an asymptotically optimal protocol family for data authentication that uses short man...

متن کامل

ASIC Design of 600Mbps 4 4× MIMO Wireless LAN System

This paper shows the design and ASIC implementation of a 802.11n WLANs 4x4 MIMO OFDM PHY transceiver. The system supports the maximum data rate of 600Mbps. The MMSE-SQRD SIC MIMO decoder scheme, which has high BER performance and acceptable hardware cost, is implemented. To meet the required high throughput rate, parallel processing Scrambler/Descrambler, parallel processing BCC, and radix-4 so...

متن کامل

Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices

Connectivity becomes increasingly important also for small embedded systems such as typically found in industrial control installations. More and more use-cases require secure remote user access increasingly incorporating handheld based human machine interfaces, using wireless links such as Bluetooth. Correspondingly secure operator authentication becomes of utmost importance. Unfortunately, of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015