OPTIMIZATION OF BUFFER AND PRIORITIES FOR ENSURING SECURITY IN BLUETOOTH NETWORKS

Authors

DOI:

https://doi.org/10.17721/ISTS.2024.8.5-16

Keywords:

buffer optimization, video streaming, Bluetooth wireless networks, adaptive management, data transmission, signal quality, packet loss, user priority management, cross traffic, information protection

Abstract

B a c k g r o u n d . The optimization of buffer zone size for information protection plays a crucial role in ensuring the security of video streaming over Bluetooth wireless networks, particularly given the increased data transmission speeds and the use of adaptive modulation with a three-tier buffer. Recent studies show that proper management of buffer size can significantly enhance the quality of video data transmission and reduce security threats. An important aspect of ensuring security in video streaming systems over wireless networks like Bluetooth is the integration of cutting-edge information protection technologies. Modern trends in cybersecurity encompass key elements such as data encryption, access control, and multi-factor user authentication. These mechanisms not only protect data from unauthorized access but also ensure its integrity and confidentiality at every stage of processing and transmission.

M e t h o d s . The study employed analytical methods including modeling and simulation, statistical and comparative analysis, experimental research, and risk assessment, enabling a comprehensive understanding of data transmission quality management in Bluetooth networks under cross traffic conditions.

R e s u l t s . Properly configuring the buffer zone size can significantly enhance the efficiency and reliability of protecting critical data from unauthorized access and cyberattacks. Modern approaches to buffer size optimization utilize traffic analysis and modeling methods, as well as machine learning algorithms to predict traffic volumes and characteristics. For instance, clustering algorithms can be employed to identify traffic types and characteristics, allowing for more efficient resource allocation and buffer space management. To effectively optimize the buffer zone size, it is essential to consider system performance and information security standards, including ISO/IEC 27001 and ISO/IEC 27002. ISO/IEC 27001 outlines requirements for information security management systems, emphasizing risk assessment and the implementation of security measures. ISO/IEC 27002 provides recommendations for data protection, such as the use of cryptographic methods. The buffer zone size must meet the requirements of cryptographic algorithms and ensure resilience against attacks such as DoS and buffer overflow, while also considering scalability and compliance with contemporary regulations.

C o n c l u s i o n s . Optimizing the buffer zone size in the context of video data transmission over Bluetooth networks is a critical aspect that affects not only the stable operation of the system as a whole but also the effective management of traffic flows, allowing for improvements in information transmission quality and significantly reducing potential risks from external cyberattacks and internal failures that may arise due to cross traffic or other network anomalies. The application of adaptive signal modulation in close interaction with three-tier data buffering enables the system to dynamically adjust to variable communication channel parameters, such as transmission speed, noise levels, and interference. This, in turn, helps maintain a high level of video stream quality even under adverse environmental conditions and increased signal variability. The integration of three buffer levels, each performing distinct storage and preprocessing functions for incoming data, creates an additional protective barrier that significantly minimizes the negative impact of external factors on system stability, particularly by preventing possible delays, interruptions, or data loss that may arise due to changing environmental conditions or network impediments during information transmission.

Downloads

Download data is not yet available.

References

Костюк, Ю. В., & Костюк Є. В. (2024). Вдосконалені методи безпеки в 4G мережах з метою забезпечення ефективного захисту від атак на передачу даних. Наука і техніка сьогодні, 6(34), 789–807. https://doi.org/10.52058/2786-6025-2024-7(35)-789-804

Костюк, Ю. В., & Шапран, В. О. (2024). Технології виявлення аномальних подій та сигнатур в реальному часі. Наука і техніка сьогодні, 4(32), 1069–1084. https://doi.org/10.52058/2786-6025-2024-4(32)-1069-1084

Костюк, Ю. В., Бебешко, Б. Т., Крючкова, Л. П., Литвинов, В. Д., Оксанич, І. Г., Складанний, П. М., & Хорольська, К. В. (2024). Захист інформації та безпека обміну даними в безпроводових мобільних мережах з автентифікацією і протоколами обміну ключами. Кібербезпека: освіта, наука, техніка, 1(25), 229–252. https://doi.org/10.28925/2663-4023.2024.25.229252

Криворучко, О. І., Костюк, Ю. В., & Десятко, А. (2024). Систематизація ознак несанкціонованого доступу до корпоративної інформації на основі застосування методів криптографічного захисту. Ukrainian Scientific Journal of Information Security, 30(1), 140–149.

Chen, L. (2024). Impact of cross-traffic on bandwidth and video quality in Bluetooth networks. Telecommunications Systems, 77(1), 67–82.

Chen, L.-J., Kapoor, R., Sanadidi, M. Y., Lee, R., & Gerla, M. (2004). Audio streaming over Bluetooth: An adaptive ARQ timeout approach. In Proceedings of the Conference: 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 23–24 March 2004 (pp. 196–201). Hachioji, Tokyo, Japan, 24.

Chia, C. H., & Beg, M. S. (2003). Realizing MPEG-4 video transmission over wireless Bluetooth link via HCI. IEEE Transactions on Consumer Electronics, 49(4), 1028–1034. https://ieeexplore.ieee.org/document/1261191

Doe, J., Patel, R., & Kim, S. (2023). User priority management for critical data transmission in Bluetooth networks. International Journal of Network Management, 33(4), e2178.

Iyer, A., & Desai, U. (2003). A comparative study of video transfer over Bluetooth and 802.11 wireless MAC. In Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '03), 3 (pp. 2053–2057). IEEE.

Razavi, R., Fleury, M., & Ghanbari, M. (2007). Low-delay video control in a personal area network for augmented reality. In Proceedings of the 4th Visual Information Engineering (pp. 1245–1300). The institution of engineering and technology.

Rzaieva, S., Rzaiev, D., Kostiuk, Y., Hulak, H., & Shcheblanin, O. (2024). Methods of modeling database system security. In Proceedings of CPITS-2024: Cybersecurity Providing in Information and Telecommunication Systems (рр. 384–390). CEUR Workshop Proceedings (CEUR-WS.org).

Razavi, R., Fleury, M., & Ghanbari, M. (2008). Power-constrained fuzzy logic control of video streaming over a wireless interconnect. EURASIP Journal on Advances in Signal Processing, 1–14. https://doi.org/10.1155/2008/560749

Scheiter, C., Steffen, R., Zeller, M., Knorr, R., Stabernack, B., & Wels, K.-W. (2003). A system for QoS-enabled MPEG-4 video transmission over Bluetooth for mobile applications. In Proceedings of International Conference on Multimedia and Expo (ICME '03),1 (pp. 789–792).

Smith, A., Johnson, B., & Lee, C. (2022). Dynamic buffer management for video streaming in wireless networks. Journal of Wireless Communications and Networking, 2022(15), 235–250.

Tahir, S., Aldabbagh, G. A., Bakhsh, S. T., & Said, A. M. (2021). Hybrid congestion sharing and route repairing protocol for Bluetooth networks. WSEAS Transactions on Computers, 49–55. https://doi.org/10.37394/23205.2021.20.6

Wenlong, W., Chunhua, Z., Zilong, C., & Shuai, L. (2021). Mobile node design of indoor positioning system based on Bluetooth and LoRa network. Journal of Physics, 1738(1), 1–4. https://doi.org/10.1088/1742-6596/1738/1/012092

Zhang, M., Wang, Y., & Chen, T. (2023). Security considerations in adaptive buffer management strategies. Information Systems Security, 32(2), 123–139.

Published

2025-03-21

Issue

Section

Cybersecurity and information protection

How to Cite

OPTIMIZATION OF BUFFER AND PRIORITIES FOR ENSURING SECURITY IN BLUETOOTH NETWORKS. (2025). Information Systems and Technologies Security, 2(8), 5-16. https://doi.org/10.17721/ISTS.2024.8.5-16