=Paper= {{Paper |id=Vol-3826/paper12 |storemode=property |title=Integrated protection strategies and adaptive resource distribution for secure video streaming over a Bluetooth network |pdfUrl=https://ceur-ws.org/Vol-3826/paper12.pdf |volume=Vol-3826 |authors=Yuliia Kostiuk,Pavlo Skladannyi,Nataliia Korshun,Bohdan Bebeshko,Karyna Khorolska |dblpUrl=https://dblp.org/rec/conf/cpits/KostiukSKBK24 }} ==Integrated protection strategies and adaptive resource distribution for secure video streaming over a Bluetooth network== https://ceur-ws.org/Vol-3826/paper12.pdf
                                Integrated protection strategies and adaptive resource
                                distribution for secure video streaming over a Bluetooth
                                network ⋆
                                Yuliia Kostiuk1,†, Pavlo Skladannyi1,2,*,†, Nataliia Korshun1,†, Bohdan Bebeshko1,†
                                and Karyna Khorolska1,†
                                1
                                 Borys Grinchenko Kyiv Metropolitan University, 18/2 Bulvarno-Kudriavska str., 04053 Kyiv, Ukraine
                                2
                                 Institute of Mathematical Machines and Systems Problems of the National Academy of Sciences of Ukraine, 42 Ac. Glushkov
                                ave., 03680 Kyiv, Ukraine



                                                   Abstract
                                                   This paper presents an integrated approach to enhancing the security of adaptive video streams transmitted
                                                   over Bluetooth wireless networks with increased data transfer rates using adaptive modulation and a three-
                                                   zone buffer. The study addresses key security challenges such as confidentiality, integrity, and availability,
                                                   proposing a comprehensive strategy that combines adaptive encryption, dynamic modulation, traffic
                                                   multiplexing, and buffer management. The adaptive encryption mechanism allows for real-time
                                                   adjustments to encryption levels based on network conditions, ensuring both security and transmission
                                                   efficiency. A three-zone buffer policy is introduced, prioritizing the transmission of video data packets (I-
                                                   frames, P-frames, and B-frames) according to buffer occupancy and data importance. The use of traffic
                                                   multiplexing across multiple transmission paths enhances the availability of video streams, mitigating the
                                                   effects of network congestion and packet loss. The paper also explores future directions for video stream
                                                   security, including the potential of quantum encryption for unbreakable security and AI-driven techniques
                                                   for real-time threat detection and dynamic security adaptation. The relevance of lightweight encryption
                                                   methods and edge computing solutions in securing video streams within the Internet of Things (IoT)
                                                   environments is also discussed. Overall, the proposed approach balances security and performance, making
                                                   it suitable for modern multimedia applications. This research contributes to advancing video stream
                                                   protection strategies in wireless networks, ensuring continuous, secure, and high-quality video
                                                   transmission.

                                                   Keywords
                                                   adaptive video streaming, Bluetooth wireless networks, video stream security, artificial intelligence, IoT
                                                   security, multimedia applications, real-time video transmission 1



                         1. Introduction                                                              Improving Bluetooth video streaming with adaptive
                                                                                                      modulation and a three-zone buffer addresses both data
                         Video transmission in wireless networks is a key                             transmission efficiency and security concerns. Ensuring the
                         component for many modern multimedia applications, such                      confidentiality, integrity, and availability of video data is
                         as monitoring systems, video telephony, and personalized                     critical when using open communication channels [5, 6, 17,
                         television. Streaming video, using compression and                           18, 26–29, 34–36]. Confidentiality limits access to
                         buffering technologies, enables real-time transmission over                  authorized users, and the growing risks of unauthorized
                         local networks and the Internet. This requires high                          access in the globalized Internet heighten the need for
                         bandwidth, minimal delays, and acceptable data loss [1–15].                  robust security solutions [1–6, 15–18, 37].
                         However, the Internet does not always guarantee the
                         required quality of service due to the heterogeneity of                      2. Analysis of recent studies and
                         network structures and video systems. Developing effective
                         standards for video compression, conversion, and
                                                                                                         publications
                         transmission methods is a significant challenge in                           In video streaming over Bluetooth networks with increased
                         information technology [4–6, 14–33].                                         data rates using adaptive modulation and a three-zone
                                                                                                      buffer, protecting confidentiality, integrity, and availability



                                CPITS-II 2024: Workshop on Cybersecurity Providing in Information           0000-0001-5423-0985 (Y. Kostiuk);
                                and Telecommunication Systems II, October 26, 2024, Kyiv, Ukraine         0000-0002-7775-6039 (P. Skladannyi);
                                ∗
                                  Corresponding author.                                                   0000-0003-2908-970X (N. Korshun);
                                †
                                  These authors contributed equally.                                      0000-0001-6599-0808 (B. Bebeshko);
                                   y.kostiuk@kubg.edu.ua (Y. Kostiuk);                                    0000-0003-3270-4494 (K. Khorolska)
                                p.skladannyi@kubg.edu.ua (P. Skladannyi);                                               © 2024 Copyright for this paper by its authors. Use permitted under
                                                                                                                        Creative Commons License Attribution 4.0 International (CC BY 4.0).
                                n.korshun@kubg.edu.ua (N. Korshun);
                                b.bebeshko@kubg.edu.ua (B. Bebeshko);
                                karynakhorolska@gmail.com (K. Khorolska)
CEUR
Workshop
                  ceur-ws.org
              ISSN 1613-0073
                                                                                                    129
Proceedings
is critical [38–43]. Video data encryption is a promising              projections to each participant has become outdated.
method, but due to the limitations of some encryption                  Modern technologies now use compression and advanced
algorithms, adaptive encryption and visual cryptography                encoding to optimize data sizes, reduce traffic, and address
are needed to ensure both security and efficiency for large            bandwidth limitations, enhancing video stream security
data volumes [7–11, 15, 27, 34–36].                                    over Bluetooth networks [5, 7–9, 21–27, 34, 35].
    Integrity and availability are equally important. While                A more advanced approach uses a data segmentation
methods like redundancy and mirroring protect data at the              algorithm, dividing image points into non-overlapping
physical level, they do not ensure availability during                 classes and distributing video data across multiple channels
transmission. Cryptographic methods may secure integrity               without adding redundancy, minimizing transmitted data
but are not always available [2, 20–24, 28–31]. Therefore,             volume [2–6, 18, 26, 27, 34]. However, if projections are
combining visual cryptography and traffic multiplexing to              intercepted, partial information could be exposed, so
secure both confidentiality and availability is essential.             segmentation methods must reduce the value of intercepted
    As Bluetooth networks evolve, confidentiality and                  data.
availability protection methods are increasingly vital [31,                To ensure availability, a method is needed that allows
32, 44, 45]. Specialized encryption algorithms help secure             recipients to restore the image even if some projections are
video streams but may lack sufficient cryptographic                    blocked or altered by an attacker. Balancing security and
strength. Alternatives like data hiding or digital signatures          availability is crucial for protecting video transmissions
address integrity but not availability. Load balancing and             over wireless networks [5, 7–10, 13, 14, 17, 19–25].
redundancy improve availability at lower network layers                    A study of video confidentiality methods over Bluetooth
but do not address the content level, reducing their                   networks with increased data transfer rates, using adaptive
effectiveness in Bluetooth networks.                                   modulation and a three-zone buffer, proposed a
                                                                       segmentation method based on pixel brightness values.
3. The purpose of the study                                            Projections would include pixels from a specific brightness
                                                                       range, with the number of participants determining the
The purpose of this study is to develop and evaluate an                class division. For example, in a two-participant scenario,
integrated security framework for adaptive video streaming             pixels would be divided into corresponding brightness-
over Bluetooth wireless networks with enhanced data                    based classes:
transfer rates. The framework aims to address critical
security     concerns—confidentiality,     integrity,   and                                       1
                                                                        𝑃 = {(𝑥, 𝑦)|𝑓(𝑥, 𝑦) <                        𝑓(𝑥, 𝑦)},
availability—while     maintaining     high    transmission                                      𝑀𝑀
efficiency. By incorporating adaptive encryption, dynamic                                                                        (1)
modulation, traffic multiplexing, and a novel three-zone                                       1
                                                                        𝑃 = {(𝑥, 𝑦)|𝑓(𝑥, 𝑦) ≥                        𝑓(𝑥, 𝑦)}.
buffer management strategy, the research seeks to ensure                                      𝑀𝑀
the secure, reliable, and uninterrupted transmission of
                                                                          For a scenario with an arbitrary number of participants
multimedia content in resource-constrained environments.
                                                                       where 𝑛 = 2 (𝑘 > 1), the definition of classes is recursive:
The study also explores future trends, such as quantum
                                                                                                  2
encryption and AI-driven security adaptations, to further                 𝑃 = {(𝑥, 𝑦)|𝑓(𝑥, 𝑦) <                𝑓(𝑥, 𝑦)},
strengthen video stream protection in wireless networks.                                         𝑀𝑀
                                                                                                        ( , )∈
                                                                                                                               (2)
                                                                                                   2
4. Methods and Models                                                    𝑃 = {(𝑥, 𝑦)|𝑓(𝑥, 𝑦) ≥
                                                                                                  𝑀𝑀
                                                                                                                𝑓(𝑥, 𝑦)}.
                                                                                                            ( , )∈
To address emerging challenges in protecting digital video,
                                                                       where 𝑃 is the class obtained for the scheme with 2
specialized methods must be developed, focusing on
ensuring confidentiality and availability without relying              participants, for the scheme with 2 , i.e 𝑗 ∈ [0; 2   −
solely on encryption algorithms. This can be achieved                  1], а 𝑖 = 2𝑗.
through analytical transformation of the data sequence and                  At the same time, to ensure maximum availability of
route-hiding techniques during exchange, enhancing                     transmitted video information, a method of uniform image
resilience against unauthorized access using existing                  segmentation was proposed. Suppose the digital image 𝑃
physical security measures.                                            with dimensions 𝑀 × 𝑀 corresponds to the following
    A key approach involves traffic multiplexing systems               matrix:
that distribute data fragments across multiple physical
                                                                            𝑓(0,0)      𝑓(1,0)         ⋯     𝑓(𝑀 − 1,0)
channels, increasing the difficulty of reconstructing the                   𝑓(0,1)      𝑓(1,1)         ⋯     𝑓(𝑀 − 1,1)
original data based on specific needs [8, 17]. This method                                                                       (3)
                                                                               ⋮           ⋮                      ⋮
aligns with modern encryption techniques, including                      𝑓(0, 𝑀 − 1) 𝑓(1, 𝑀 − 1)       ⋯   𝑓(𝑀 − 1, 𝑀 − 1)
quantum cryptography and AI algorithms, applied at
various network transmission layers. These systems include                 It is necessary to divide it into nnn projections so that a
intermediate nodes and specialized devices that process and            minimal number of projections is required for restoring the
protect data, implementing advanced security measures                  original image [10–12, 15, 16]. To achieve this, it is evident
across the network [1, 2, 5, 7, 8, 28–32, 44, 45]. The traffic         that each projection should contain points evenly
multiplexing model uses sophisticated cryptographic                    distributed across the entire frame, meaning the projection
protection integrated with advanced data processing                    will represent a grid with equidistant nodes, and 𝑛 = 2 ,
techniques. The classical method of sending equal-sized                𝑘 ≥ 1:



                                                                 130
         𝑓(0,0)     0 ⋯ 𝑓(√𝑛, 0)            0 ⋯                         stream security over a Bluetooth wireless network with
       ⎡                                           ⎤
            0       0                                                   increased data transfer rates using adaptive modulation
       ⎢                                           ⎥
       ⎢    ⋮            ⋱                         ⎥                    with a three-zone buffer. Since brightness segmentation
                                                          (4)
       ⎢𝑓(0, √𝑛)              𝑓(√𝑛, √𝑛)            ⎥                    maximizes the difference between values of 𝑓 the value of
       ⎢    0                               0      ⎥                    the expression (𝑓 − 𝑓 ) in this case will also be maximized.
       ⎣    ⋮                                    ⋱⎦
In securing video streams over Bluetooth networks with                  Let the initial image 𝑓(𝑥, 𝑦) be segmented into 𝑛 projections
increased data rates using adaptive modulation and a three-             𝑓 (𝑥, 𝑦), … , 𝑓 (𝑥, 𝑦) using the brightness segmentation
zone buffer, restoring the original image from incomplete               method. Then the mean square error 𝜀 , of the restored
projections is crucial for maintaining integrity and                    image ℎ (𝑥, 𝑦) based on an arbitrary projection 𝑓 (𝑥, 𝑦)
confidentiality [1, 5, 7–9]. This is achieved by constructing           using interpolation methods has the following lower bound:
interpolation functions for known points to estimate                                          𝜀 ≥ (𝑓 ̅ − 𝑓 )                     (6)
unknown ones. The more projections received, the more                   where 𝑓 is the mean value of 𝑓(𝑥, 𝑦) for projection 𝑖, and 𝑓
accurate the reconstruction, enhancing data protection [2–
                                                                        is the mean value of 𝑓(𝑥, 𝑦) for the initial image. The proof
6, 10–13, 15–17, 19–22].
                                                                        of this theorem is conducted by applying the method of
     Security risks arise if attackers access a single physical
                                                                        mathematical       induction     and      transitioning   from
channel, enabling them to analyze or modify data. Since
                                                                        ℎ (𝑥, 𝑦) 𝑡𝑜𝑓 (𝑥, 𝑦).
each channel carries only part of the frame, an attacker
                                                                             The implementation of methods for ensuring
could reconstruct the original frame from an intercepted
                                                                        confidentiality and availability in digital video transmission
projection, compromising the stream’s confidentiality [1, 3,
                                                                        over distributed networks was achieved using advanced
7, 8, 17, 18]. Blocking or altering a projection could further
                                                                        video processing technologies [1–6, 8–11, 15, 17]. Microsoft
affect integrity and availability, raising concerns about
                                                                        DirectShow was employed to create components that
system robustness against attacks.
                                                                        transform the original video stream into projections.
     The study examined various methods for restoring
                                                                        Confidentiality protection relies on modern image
frames from projections, focusing on Bluetooth streaming
                                                                        segmentation, while the availability filter applies uniform
security with adaptive modulation and a three-zone buffer
                                                                        segmentation [1–6, 8–11, 15, 17]. These filters process the
[11–16, 19, 20, 46].
                                                                        stream and generate projections with predefined
     To evaluate the effectiveness of image restoration
                                                                        parameters.
methods and, consequently, video stream protection
                                                                             These filters were integrated into a filter graph for
methods over a Bluetooth wireless network with increased
                                                                        secure transmission over Bluetooth networks with adaptive
data transfer rates using adaptive modulation with a three-
                                                                        modulation and a three-zone buffer. The video source can
zone buffer, the following criteria were identified [19–24].
                                                                        be any capture device or file, and the Infinite Pin Tee Filter
One of these criteria is the minimum square mean error of
                                                                        generates the necessary stream copies based on the number
the restored image. This criterion measures the accuracy of
                                                                        of participants [7, 22–24, 26, 27, 34]. Each copy is segmented
image reproduction after the restoration procedure. It
                                                                        according to the participant's class number, and streams are
assesses the deviation between the original image and its
                                                                        transmitted via the ASF Writer filter. The final recipient
restored version. The smaller the value of this criterion, the
                                                                        combines these streams, ensuring data security and
better the image restoration, and therefore, the more
                                                                        integrity [19–25, 27, 28, 35, 36].
effective the video stream protection against possible
                                                                             The system was tested in a high-speed Bluetooth
attacks or distortions.
                                                                        network with transmission rates up to 1 Gbps, in a large
                                                                        organization’s network, meeting modern Bluetooth
         1                                                              standards [1–7, 9–19, 46]. Intel Core i9 workstations
  𝜀 =                    (ℎ(𝑥, 𝑦) − 𝑓(𝑥, 𝑦)) ⟶ 𝑚𝑖𝑛, (5)
        𝑀𝑀                                                              (4.5 GHz) were used to assess system performance. The
                                                                        main objectives were to determine the optimal number of
     The psychovisual criterion for image reproduction                  system participants based on video stream frame size and
quality is essential when evaluating image restoration                  evaluate the efficiency of protection methods. Processing
methods for securing video streams over Bluetooth                       large volumes of video data in the traffic multiplexing
networks with adaptive modulation and a three-zone buffer               system could limit overall efficiency.
[7–11, 17]. Several methods were analyzed, including                         Radio Channel Resource Allocation Algorithms for
bilinear interpolation, bicubic spline interpolation, and               Adaptive Video Streaming:
linear extrapolation. Bicubic spline interpolation proved                    The radio channel resource management algorithms for
most effective in minimizing restoration error for uniformly            securing video streams over Bluetooth networks with
segmented projections. A clear link was found between                   increased data rates, using adaptive modulation and a three-
increased gap size and higher relative error. While gap                 zone buffer, are designed to ensure reliable transmission
extrapolation worked in some cases, it was ineffective for              while meeting security requirements. These algorithms
brightness-based segmentation [27, 28, 30–32, 34, 35, 44, 45].          adjust to network changes such as signal fluctuations and
These results align with the psychovisual quality criterion,            congestion, optimizing transmission quality [14, 15, 19–22,
though expert evaluation is advised for specific cases.                 28, 35, 36]. Key features include adaptive modulation and
     Furthermore, the conclusion was formulated that                    traffic management, with machine learning methods used to
justifies the advantages of the brightness segmentation                 predict and optimize transmission, enhancing security and
method over other methods in the context of ensuring video              reliability.


                                                                  131
In parallel, systems for storing and transmitting video over          proportional to the value of the buffering factor and directly
HTTP have grown in popularity due to increased mobile                 proportional to the average bitrate of the stream. Two QoE
device usage, social media integration, and the demand for            criteria characterize the buffering factor for a specific user 𝑖:
distance      learning.    Video      transmission    is   a               The normalized ratio of buffering and viewing durations:
telecommunications priority, utilizing two main HTTP-                                                   𝑏
based technologies: non-adaptive (HTTP Progressive                                       𝑔 = lim                                   (7)
                                                                                                ⟶ 𝜔 +𝑏
Download) and adaptive (HTTP Adaptive Streaming),
                                                                      where 𝑏 is the total buffering duration of user 𝑖 during
defined by the DASH standard. As user mobility and
                                                                      time 𝑇; 𝜔 is the total video viewing duration by user 𝑖
reliance on wireless networks grow, these networks face
                                                                      during time 𝑇.
strain, leading to issues like buffering and playback
                                                                           The ratio of buffering and viewing durations:
interruptions [14, 15, 19–22, 28, 35, 36].
    The performance of centralized wireless networks is                                                𝑏
                                                                                            𝑞 = lim        ,                       (8)
significantly impacted by how frequency-time resources are                                        ⟶ 𝜔

allocated among users. Scheduling algorithms at the base                   In studying wireless systems for video stream security
station handle this resource allocation, but since these              over Bluetooth networks with increased data transfer rates,
algorithms vary by manufacturer, they directly affect                 using adaptive modulation and a three-zone buffer,
overall system performance [9–16, 19, 20, 37, 46]. Research           differences were noted between adaptive and non-adaptive
into efficient scheduling algorithms is essential for                 transmission technologies [22–26, 28–31, 36]. While many
maintaining high performance and ensuring optimal                     studies focus on wireless communication performance,
Quality of Experience (QoE) during video transmission via             there remains a gap in data for certain QoE aspects. This
the HTTP protocol.                                                    research evaluates video quality using both technologies in
    Key aspects of HTTP-based video transmission include              a centralized wireless HTTP transmission model, where
analyzing technologies and assessing user QoE, which is               subscribers connect via radio channels. The model includes
vital for evaluating playback satisfaction. Models and                local components such as a video server, buffering, and
criteria for evaluating video quality perception are                  playback processes, accounting for data transfer speeds and
developed based on this analysis. A common QoE                        clip selection [15, 34–37].
evaluation method is the Mean Opinion Score (MOS), which                   For Bluetooth video streaming with adaptive
rates user satisfaction on a 1–5 scale, depending on video            modulation and a three-zone buffer, the system operates in
playback statistics and whether the transmission is adaptive          equal-duration periods (slots), optimizing the allocation of
or non-adaptive [5–8, 11, 17, 18].                                    frequency-time resources. A wireless channel model and
    In the analysis of MOS functions and their                        resource scheduler at the base station play critical roles in
approximations, two key factors affecting video quality               resource allocation, directly influencing data transfer speeds
perception were identified: buffering during playback,                and user satisfaction [15, 20–24, 28, 35, 36]. A software-
which influences both adaptive and non-adaptive                       hardware setup, including a video player that sequentially
technologies, and the average bitrate, which plays a crucial          downloads segments from the server, is also key to securing
role in adaptive technologies. These factors directly impact          video streams (Fig. 1). Below are the main assumptions used
user satisfaction and overall video transmission quality.             in these models.
    User satisfaction with viewing and, consequently, the
performance of the telecommunications system is inversely




Figure 1: Video Data Transmission Model in a Wireless Network
Source: Developed by the author in the LibreOffice environment

Each video data segment 𝑗 is presented in a continuous                The user is considered active at time 𝑡 if they are
range of bit rates:                                                   downloading at that moment; otherwise, the user is
             𝑅 , ∈ [𝑅 , 𝑅       ], 𝑖 = 1, 𝑁,             (9)          considered inactive.
    The user behavior model is characterized by the user                  In the wireless communication channel, signal
video stream sparsity coefficient 𝑖—which is the ratio of the         attenuation during propagation occurs uniformly across the
total durations of viewing and pauses to the viewing                  entire bandwidth for a specific user at a particular time. Let
duration of user 𝑖 over a given time interval 𝑇 ⟶ ∞:                  us introduce the variable 𝐶 (𝑇), which equals the data
                                                                      transmission speed through the wireless channel if all
                             𝜔 +𝑏
                   𝛾 = lim                               (10)         available resources were allocated to the user 𝑖 at time 𝑡.
                        ⟶      𝜔



                                                                132
This is called the maximum achievable channel speed. The                  The presented analytical model describes the key
assumptions used for the wireless channel model are:                      components and parameters of a real video data
    During the transmission of one packet 𝑘 from segment                  transmission system over the HTTP protocol.
𝑗 by user 𝑖 in the downlink, the maximum achievable                           For all possible scheduling and video adaptation
wireless channel speed is constant:                                       algorithms that meet the assumptions, the following
      𝐶 (𝑇) = 𝐶 , , , 𝑡 , , ≤ 𝑡 ≤ 𝑡 , , + ∆𝑡 , , ,     (11)               inequality holds:
where 𝑡 , , is the moment when user 𝑗, ∆𝑡 , , is the duration                                          𝐸[𝑅 ] 𝐸 𝐶
                                                                                        (1 − 𝜈 𝜈 )                     ≤ 1,        (18)
of downloading packet 𝑘 by user 𝑖 from segment 𝑗, 𝐶 , , is                                                𝑞 +𝛾
being the maximum achievable channel speed during the                         The relationship between all parameters of the video
packet download.                                                          data transmission network is reproduced by dependencies
The sequence of random variables:                                         on the features of the user behavior model (𝛾 , 𝑞 ) video
                 𝐶 , , 𝐶 , , … , 𝑖 = 1, 𝑁,               (12)             stream properties (𝐸[𝑅 ]) and the operation of the wireless
where 𝐶 ,     =        ∑ ,         , forms an ergodic random              channel (𝐸 𝐶 ) for each network participant.
                   ,         , ,
                                                                              The radio channel resource allocation algorithms for
process with finite mathematical expectations 𝐸[𝐶 ] and                   adaptive video streams, which are expressed by the ratio of
variation coefficients 𝜈 С .                                              buffering duration to viewing duration 𝑞 , while
    At each moment 𝑡, the scheduling algorithm distributes                considering the average bit rate of the viewed stream, are of
portions of the channel resources 𝛼 (𝑡) for all users:                    great importance. It is worth noting that due to the presence
             𝐴(𝑡) = {𝛼 (𝑡),     𝑖 = 1, 𝑁}              (13)               of video stream adaptation to wireless channel conditions,
    An evident constraint on the operation of the                         the scheduling and video adaptation algorithms, denoted as
scheduling algorithm is the finite volume of available                    𝐴 and 𝐵, вrespectively, influence the buffering factor.
resources:                                                                According to the research on quality criteria conducted in
                                                                          the first section, it is proposed to evaluate system
                       ∀𝑡:   𝛼 (𝑡) ≤ 1                      (14)          performance using two criteria. The average value of the
                                                                          ratio of buffering duration to viewing duration:
    To optimize resource allocation in a Bluetooth wireless
                                                                                                      1
network with increased data transfer rates using adaptive                               𝑞 (𝐴, 𝐵) =      (     𝑞 (𝐴, 𝐵)),          (19)
modulation with a three-zone buffer, the scheduler has                                                𝑁
access to prior data, including portions of allocated channel                  The average bitrate of the viewed video stream, which
resources, maximum achievable channel speeds, and the                     is a key parameter:
volume of transmitted data for each individual user:                                             1
      𝐴(𝑡) = 𝒜(𝛼 (𝜏), 𝐶 (𝜏); 𝜏 < 𝑡, 𝑖 = 1, 𝑁),           (15)                        𝑅(𝐴, 𝐵) =     (         𝐸 [𝑅 (𝐴, 𝐵)]),       (20)
                                                                                                 𝑁
where 𝐴 (∙) is represents the scheduling algorithm.                            The primary goal is to determine the lower bound for all
     To ensure the security of video streams over a Bluetooth
                                                                          possible scheduling and video adaptation algorithms that
wireless network with increased data transfer rates using
                                                                          meet the conditions introduced in the second section for the
adaptive modulation with a three-zone buffer, the following
                                                                          average ratio of buffering duration to viewing duration for
assumptions are considered for the scheduling algorithm
                                                                          all users in the system, provided that the average bitrate of
[10, 17, 46]:
                                                                          the viewed stream for all users is not less than the given
     The scheduler allocates all available channel resources
                                                                          value 𝑅 .
at every moment.
                                                                                     𝑄=            inf          𝑞 (𝐴, 𝐵)           (21)
     The scheduler does not allocate resources to inactive                                , : ( , )         , ∈𝒜, ∈ℬ
users.                                                                        The task of finding the lower bound of the quality of
     Each active user is guaranteed a minimum portion of the              experience (QoE) criterion 𝑄         is formulated as an
channel resources.                                                        optimization problem aimed at minimizing this criterion
     When a new video data segment is requested by the                    under certain constraints and conditions. The objective is to
video player, the problem of choosing the bit rate for the                minimize 𝑄 = ∑ 𝑞 subject to:
requested segment is solved by the following expression:
       𝑅 , = ℬ(𝑅 , , 𝐶 (𝜏), 𝛼 (𝜏); 𝑘 < 𝑗, 𝜏 < 𝑡 , ),       (16)                     ⎧                       𝑅𝐶
                                                                                           1−𝜈 𝜈                 − 1 ≤ 0,
where 𝐵 (∙) is represents the algorithm for calculating the                         ⎪                       𝑞 +𝛾
                                                                                    ⎪
                                                                                    ⎪
bit rate of segment 𝑗 for user 𝑖, 𝑅 , is the bit rate of segment                          1
                                                                                        −      𝑅 +𝑅        ≤0                     (22)
𝑗 for user 𝑖, 𝑡 , is the time when user 𝑖 requests segment 𝑗.                       ⎨     𝑁
     The frequency of switching bit rates is limited:                               ⎪
                                                                                    ⎪ 𝑅 ∈ [𝑅 , 𝑅 ], 𝑖 = 1, 𝑁
                           𝜎[𝑅 ]                                                    ⎪
                       ∀𝑖:       ≤𝜈 ,                        (17)                   ⎩     − 𝑞 ≤ 0, 𝑖 = 1, 𝑁
                           𝐸[𝑅 ]
where 𝐸[𝑅 ] = 𝑙𝑖𝑚 ⟶ 𝐸 𝑅 , , 𝜎[𝑅 ] = 𝑙𝑖𝑚 ⟶∞ 𝐸 𝑅 , .                                     𝑅 = 𝐸 [𝑅 ] та 𝐶 = 𝐸[𝐶 ],                   (23)
     The sequences 𝑅 , , 𝑅 , , … , 𝑖 = 1, 𝑁 form ergodic                      In this context, the optimization problem is non-linear
                                                                          with general constraints, making it a non-convex problem
random processes with finite mathematical expectations
                                                                          with no standard solutions [9–12, 15, 16, 21–27, 34, 35]. To
𝐸[𝑅 ] and variation coefficients that do not exceed the
                                                                          solve this, a two-stage optimization approach is proposed.
values of 𝜈 respectively.


                                                                    133
First, an intermediate optimization problem is introduced,             ensuring stable video streams even in challenging
where a solution algorithm is already known. Then, the                 conditions [3, 7, 8, 12, 15, 16]. This approach enhances both
relationship between the main optimization problem and                 security and efficiency, meeting modern demands for
the intermediate one is established, followed by a relaxation          Bluetooth video streaming.
of constraints to solve the original problem.                               In the transmission buffer, Bluetooth packets are
    This approach involves solving the intermediate                    prioritized and transmitted using one of two modulation
problem first, and then formulating the final problem with             schemes based on their priority. Low-priority packets are
relaxed constraints. A new algorithm is proposed to solve              sent at 3 Mbps to reduce errors. The Bluetooth ARQ
this, comparing the performance of existing heuristic                  (Automatic Repeat Request) mechanism, with adjustable
algorithms for wireless channel resource allocation based              flush timeouts, prevents packet delays that could lead to
on the QoE criterion QQQ. The lower bound for adaptive                 frame skips. The flush timeout is set at 1250 microseconds,
video streams is derived and compared with heuristics for              equivalent to two Bluetooth timeslots, after which
non-adaptive streams. Simulation modeling of heuristic                 handshake packets stop [19–21]. Non-flushable settings
scheduling algorithms for adaptive video transmission was              protect against data loss in other streams [14, 19, 26, 27, 34,
performed with a fixed number of users per cell, while non-            46].
adaptive video transmission was simulated assuming the                      As technologies evolve, secure transmission and data
video stream bit rate viewed by all users equals 𝑅 .                   confidentiality are increasingly vital. Modeling methods,
    In summary, the challenges of securing video streams               such as the Gilbert-Elliott ergodic chain and Gilbert’s
over a Bluetooth wireless network with increased data rates            Markov chains, improve understanding of wireless channel
using adaptive modulation and a three-zone buffer were                 errors and support effective protection strategies [30–32].
addressed [7–10, 17, 18]. A two-stage optimization approach            Adaptive methods like adaptive frequency hopping (AFH)
was proposed: first, an intermediate optimization problem              in Bluetooth ensure stable transmissions by avoiding
with a known solution was introduced, followed by                      interference.
establishing its relationship to the main problem. Finally, an              End-to-end encryption (E2EE) is also becoming more
optimization problem with relaxed constraints was                      common, offering robust protection against unauthorized
formulated and solved [3, 7, 24–27, 34, 35].                           access throughout the transmission process [20–25, 27, 31].
    An algorithm was developed to solve this optimization                   Currently, the modeling of the AWGN (Additive White
problem, and its performance was compared with existing                Gaussian Noise) channel with a bit error rate (BER) of 10
wireless channel resource allocation heuristics. The study             at higher data transfer rates of 3 Mbps and an 𝐸 /𝑁 (energy
derived a bound for adaptive video streams and compared it             per bit to noise power spectral density ratio of 16 dB is
with non-adaptive heuristics. Simulation modeling of                   widely used. This method allows for analyzing the response
heuristic scheduling algorithms for both adaptive and non-             of various protection schemes to different channel
adaptive video was conducted, assuming a fixed number of               conditions. The Gilbert-Elliott ergodic chain with two states
users per cell. For non-adaptive video, the modeling                   in discrete time and Gilbert’s Markov chain are applied to
assumed all users viewed video streams at the average                  model the error characteristics of a wireless channel. Even
bitrate 𝑅 .                                                            with the use of modern technologies such as adaptive
    The study tackled the challenges of securing video                 frequency hopping (AFH) in Bluetooth version 5.2, the
streaming over Bluetooth networks using adaptive                       Gilbert-Elliott model remains an effective tool for channel
modulation with a three-zone buffer. A nonlinear                       analysis, considering its limitations and impact on
optimization problem was formulated and solved using a                 audio/video applications. Studying the average durations of
two-stage approach [12–17, 19]. The proposed algorithm                 good and bad channel states 𝑇 and 𝑇 , helps to understand
effectively enhanced video stream security. A comparative              the system’s behavior in real-world operating conditions,
analysis of resource allocation methods demonstrated the               while setting the timeout at the appropriate level allows for
benefits of adaptive modulation over non-adaptive                      effective data flow management to ensure the security and
approaches. As a result, the developed radio channel                   reliability of information transmission. The average
resource allocation algorithms proved effective in ensuring            duration of a good state in seconds, and the duration of a
both security and efficiency for video streaming over                  bad state is 𝑇 = 0,25 𝑠𝑒𝑐𝑜𝑛𝑑𝑠. In Bluetooth time slot units,
Bluetooth networks with increased data rates.                          where each time slot lasts 625 microseconds, 𝑇 = 3200,
    Integrated Priority and Information Protection Strategy            and 𝑇 = 400. Consequently, if the current state is good (g),
for Multi-Level Interaction Among Users:                               the probability that the next state will also be good (𝑔),
    The integrated strategy for managing priorities and                (𝑃𝑔𝑔) is 0,9996875, while the probability that the next state
information protection in Bluetooth wireless networks                  will be bad (𝑏), (𝑃𝑏𝑏) given the current state is 0.9975.
combines advanced traffic management and security                                             1                 1
technologies. It includes a multi-level interaction model that                      𝑇 =             , 𝑇 =                          (24)
                                                                                          1 − 𝑃𝑔𝑔            1 − 𝑃𝑏𝑏
dynamically adjusts bandwidth and priorities based on data
                                                                            At a speed of 3 Mbps, the bit error rate (BER) in the good
type and importance, ensuring secure transmission through
                                                                       state is 10 , and in the bad state, it is—10 . The two SNR
priority buffering policies that consider transmission
                                                                       states of 16.00 and 14.70 dB correspond to varying
context and confidentiality [20–23].
                                                                       transmission conditions. The first SNR value is ideal for
    Recent innovations, such as AI integration, enable real-
                                                                       comparison with a single-stationary model, while the
time traffic analysis and adaptive decision-making. Machine
                                                                       second is optimal for 2 Mbps transmission speeds. As SNR
learning optimizes transmission priorities and bandwidth,
                                                                       worsens below 10 dB, only basic rate-protected packets


                                                                 134
remain viable. Adaptive User Priority (UP) schemes are                  dynamically adjusted as data and buffer usage change. The
effective for Enhanced Data Rate (EDR) modes, which build               boundary between protected and unprotected P-frames
on earlier concepts like IBM’s BlueHoc and Blueware, with               shifts according to historical encoding ratios, adapting in
specifications covering baseband, L2CAP, and multi-slot                 real-time.
packet transmission [28–33, 44, 45]. Clock drift is considered               In zone 3, when the buffer is full, B-frames and P-frames
in timing and scheduling, although real-world                           lose protection, but I-frames retain it, like in zone 1, using
implementations may experience slower EDR mode                          random number generation and fraction comparison. The
switching.                                                              UP policy is linear in zones 1 and 3 but remains nonlinear
    Changes in priority buffering policies align with                   for P-frames, balancing content importance with buffer fill
advanced traffic management and video security measures.                levels. This ensures that P-frame output adjusts toward a
Adaptive buffers improve data prioritization by considering             linear mode, compensating for buffer saturation.
factors like data importance, confidentiality, quality of                    As security and efficiency demands in video
service, and security requirements. Critical data, such as              transmission grow, improving buffer priority policies
confidential information, is given higher priority to ensure            become crucial [12, 22–24, 32, 37, 44–46]. Modern methods
faster and more secure transmission [20, 23, 28, 29, 31, 32,            safeguard data while ensuring quality transmission.
44, 45].                                                                Adaptive buffers, combined with modulation technology,
    The integration of adaptive modulation with a three-                allow dynamic responses to network conditions, enhancing
zone buffer allows dynamic adjustments to signal changes                security and performance in wireless communication.
and transmission quality, optimizing bandwidth and                           Dynamic frame content regulation for enhancing video
reducing the risk of buffer overflow as data volumes and                stream protection efficiency:
noise levels fluctuate. Modern priority buffering policies                   Dynamic frame content regulation is a key approach for
have become essential for securing video streams over                   optimizing cybersecurity and information protection in
Bluetooth networks, balancing transmission efficiency, data             video sequences by managing frame sizes based on
protection, and user satisfaction.                                      parameters like brightness, motion, and texture [23–27, 30–
    These policies prioritize data based on buffer fill levels.         32, 34, 35, 44, 45]. Real-time adjustments, such as resolution
In zone 1, where the buffer is less full, protection strategies         changes or compression, are made to ensure efficient video
like random number generation are used [8–10]. In zone 3,               transmission.
when the buffer is nearly full, urgent data is transmitted                   Modern systems analyze brightness, motion, texture,
immediately, with reduced protection to maintain speed.                 and context, allowing quick responses to video stream
This approach optimizes security while managing data flow               alterations. Advanced algorithms adapt transmission
and resource use [1–6, 11, 17, 18]. Given the rise of cyber             parameters, reducing resolution or applying compression
threats, such policies are crucial for ensuring strong data             during high motion to decrease data volume while
protection in dynamic network environments.                             maintaining essential details. This improves network
    In zone 1 of the buffer, all Bluetooth packets of type I-           efficiency and prevents unauthorized access [13].
or P-frames are automatically protected by sending them at                   Dynamic regulation is especially important in Bluetooth
a lower data transmission rate. B-frame packets are only                wireless networks using adaptive modulation and a three-
protected in zone 1 if they pass the following test. A                  zone buffer, optimizing bandwidth and reducing data
comparison is made between a uniformly distributed                      leakage during intense video changes to balance protection
random number generated in the interval [0,1] and the                   and efficiency [2, 7, 9]. Adjusting the ratio between buffer
fraction 𝑓, which determines the buffer’s occupancy with                zones enhances system resilience. Spatial content affects I-
packets relative to the zone’s bandwidth (Fig. 2). If the               frame size and transmission speed, while temporal content
random number is greater than 𝑓, the B-frame packet is also             impacts B- and P-frame processing, crucial for
transmitted at a reduced transmission speed, indicating its             confidentiality. Research [36] evaluates spatial and temporal
protection. This test is implemented so that the number of              information using brightness filtering and the Sobel
protected B-frame packets increases linearly with the                   algorithm to strengthen video data protection (Fig. 3).
buffer’s fill level in zone 1.




Figure 2: Temporal Change of Spatial Information
Source: Aggregated from sources [8–13, 15, 16, 22–27, 34, 35]
                                                                        Figure 3: Temporal information changes over time for the
As the buffer fills and packets enter zone 2, a distinct                same sequence
priority policy applies for P-frames. In this zone, I-frames            Source: Aggregated from sources [11, 15, 16, 22–27, 34, 35]
remain protected, while B-frames lose their protection. P-
                                                                        The analysis of the temporal dimension of video data
frames are partially protected based on the ratio of
                                                                        involves calculating brightness differences between frames
internally encoded macroblocks, with protection levels


                                                                  135
and computing frame-by-frame standard deviation (SD),                          Reality, 4th Visual Information Engineering (2007)
which helps assess changes in spatial and temporal                             1245–1300.
information. This highlights the need for dynamic buffer                [3]    W. Wilkowska, et al., Analyzing Technology
zone adjustments to ensure efficient data storage and                          Acceptance and Perception of Privacy in Ambient
processing, particularly for cybersecurity and data                            Assisted Living for using Sensor-based Technologies,
protection.                                                                    PLoS ONE, 17(7) (2022).
     Dynamic frame regulation is crucial for optimizing data            [4]    S. Ye, R. S. Blum, L. J. Cimini Jr., Adaptive Modulation
transmission and security over Bluetooth connections.                          for Variable-Rate OFDM Systems with Imperfect
Bluetooth frames made up of asynchronous connectionless                        Channel Information, in: 55th IEEE Vehicular
(ACL) packets, occupy multiple time slots, and their size                      Technology Conference, 2 (2002) 767–771.
impacts payload. Continuous monitoring of content                       [5]    M. J. Haenssgen,         After      Access:    Inclusion,
characteristics such as brightness, motion, and texture                        Development, and a More Mobile Internet, Journal of
allows for dynamic adjustments in frame sizes, improving                       Human Development and Capabilities, 18(1) (2017).
transmission efficiency and security [7, 8, 14, 18, 25, 46].            [6]    S. W. Campbell, From Frontier to Field: Old and New
     Packet size quantization often increases Bluetooth                        Theoretical Directions in Mobile Communication
packet sizes, reducing bandwidth efficiency. Dynamic                           Studies, Communication Theory, 29(1) (2019) 46–65.
adjustments ensure that when packet sizes don’t match                          doi: 10.1093/ct/qty021.
content, smaller transmission schemes (e.g., switching from             [7]    A. Iyer, U. B. Desai, A Comparative Study of Video
3DH5 to 3DH3 or 3DH1) can improve efficiency [3–5, 18, 28,                     Transfer over Bluetooth and 802.11 Wireless MAC,
34–36]. A key challenge is managing partially filled packets,                  IEEE Wireless Communications and Networking
which wastes bandwidth. Research suggests forming filled                       Conference, 3 (2003) 2053–2057.
Bluetooth packets to enhance performance, though this                   [8]    R. Prasad, Book Review: After Access: Inclusion,
could affect noise immunity [1, 2, 26, 28].                                    Development and a More Mobile Internet,
     The CQDDR model adjusts packet types based on                             Communication and the Public, 2(1) (2017).
channel quality but overlooks content and network                       [9]    C. H. Chia, M. S. Beg, Realizing MPEG-4 Video
congestion. An improved scheme using a three-zone buffer                       Transmission over Wireless Bluetooth Link via HCI,
effectively prioritizes data transmission by considering                       IEEE Transactions on Consumer Electronics, 49(4)
these factors [20, 25, 34]. Additionally, Hamming code error                   (2003) 1028–1034.
correction (DAEC and SEC) enhances transmission                         [10]   O. Kryvoruchko,            Y. Kostiuk,       A. Desiatko,
reliability by correcting errors, improving both bandwidth                     Systematization of Signs of Unauthorized Access to
utilization and data protection.                                               Corporate Information based on Application of
                                                                               Cryptographic Protection Methods, Ukrainian
5. Conclusions                                                                 Scientific Journal of Information Security, 30(1) (2024)
                                                                               140–149.
Ensuring secure video streaming over Bluetooth networks                 [11]   K. A. Pearce, Rice Ronald. Digital Divides. From
with enhanced data rates requires adaptive modulation and                      Access to Activities: Comparing Mobile and Personal
a three-zone buffer. To meet confidentiality, integrity, and                   Computer Internet Users, J. Commun. 63(4) (2013)
availability requirements, strategies combining data                           721–744. doi: 10.1111/jcom.12045.
protection and adaptive resource allocation are essential.              [12]   R. Razavi,       M. Fleury,     M. Ghanbari.     Power-
Buffer priority policies adjust protection based on buffer fill                Constrained Fuzzy Logic Control of Video Streaming
levels, safeguarding I-frames in critical zones and                            over a Wireless Interconnect, EURASIP Journal on
optimizing resource use.                                                       Advances in Signal Processing (2008). doi:
    As Bluetooth traffic increases, adaptive buffers, and                      10.1155/2008/560749.
modulation maintain video quality. Adjustments based on                 [13]   C. Scheiter, et al., A System for QOS-enabled MPEG-4
frame brightness and buffer size improve stream                                Video Transmission over Bluetooth for Mobile
management, while Hamming codes enhance reliability. A                         Applications, International Conference on Multimedia
two-stage optimization, using cryptography and data                            and Expo (ICME’03), 1 (2003) 789–792. doi:
analysis, ensures secure and efficient streaming, meeting                      10.1109/ICME.2003.1221036.
modern cybersecurity standards.                                         [14]   S. Tahir, et al., Hybrid Congestion Sharing and Route
    Overall, secure video streaming over Bluetooth                             Repairing Protocol for Bluetooth Networks, Wseas
networks demands an integrated approach that combines                          Transactions On Computers 20 (2021) 49–55. doi:
encryption, authentication, and quality management to                          10.37394/23205.2021.20.6.
ensure data protection.                                                 [15]   G. R. Reddy, et al., An Efficient Algorithm for
                                                                               Scheduling in Bluetooth Piconets and Scatternets,
References                                                                     Wireless Networks, 16(7) (2009) 1799–1816. doi:
[1]   W. Wang, et al., Mobile Node Design of Indoor                            10.1007/s11276-009-0229-3.
      Positioning System based on Bluetooth and LoRa                    [16]   T. Dave, U. Pandya, Simultaneous Monitoring of
      Network, Journal of Physics: Conference Series,                          Motion ECG of Two Subjects using Bluetooth Piconet
      1738(1) (2021).                                                          and Baseline Drift, Biomedical Engineering Letters,
[2]   R. Razavi, M. Fleury, M. Ghanbari, Low-Delay Video                       8(4) (2018) 365–371. doi: 10.1007/s13534-018-0081-4.
      Control in a Personal Area Network for Augmented


                                                                  136
[17] Core Specification of the Bluetooth System, Version              [32] A. E. Khalil, et al., Efficient Speaker Identification
     2.1+EDR (2007). URL: http://www.Bluetooth.com                         from Speech Transmitted over Bluetooth Networks,
[18] Q. Li, M. van der Schaar, Providing adaptive QoS to                   Int. J. Speech Technol. 17(4) (2014).
     layered video over wireless local area networks                  [33] V. Lakhno, et al., Methodology for Placing
     through realtime retry limit adaptation, IEEE                         Components of a Video Surveillance System for Smart
     Transactions on Multimedia, 6(2) (2004) 278–290.                      City Based on a Composite Cost Optimization Model,
[19] Z.-K. Chen, An Adaptive FEC to Protect RoHC and                       Software Engineering Perspectives in Systems, 501
     UDP-Lite H.264 Video Critical Data, Journal of                        (2022). doi: 10.1007/978-3-031-09070-7_2.
     Zhejiang University—Science A, 7(5) (2006). doi:                 [34] A. B. Nahas,      et al.,     BlueFlood:     Concurrent
     10.1631/jzus.2006.A0910                                               Transmissions for Multi-Hop Bluetooth 5—Modeling
[20] C.-H. Yang, S.-J. Lee, Virtual Scatternet Formation for               and Evaluation, Comput. Res. Repository, 2(4(22))
     Supporting Multicast in Bluetooth Networks, Int. J.                   (2021) 1–30. doi: 10.1145/346275.
     New Technol. Res. (2022).                                        [35] T. Chi, M. Chen, A Frequency Hopping Method for
[21] L.-J. Chen, et al., Audio Streaming over Bluetooth: an                Spatial     RFID/WiFi/Bluetooth       Scheduling      in
     Adaptive ARQ Timeout Approach, in: 24th                               Agricultural IoT, Wireless Networks, 25(2) (2017) 805–
     International Conference on Distributed Computing                     817. doi: 10.1007/s11276-017-1593-z.
     Systems, 24 (2004) 196–201.                                      [36] K. P. Rajesh, Fuzzy Logic Controller for Wireless
[22] C. Ru, et al., A New UEP Scheme for Robust Video                      Video Transmission, J. Comput. Sci. 7(7) (2011) 1119–
     Transmission        in     MIMO       System,     China               1127. doi: 10.3844/jcssp.2011.1119.1127.
     Communications, 4(5) (2006) 102–108.                             [37] V. Sokolov, et al., Method for Increasing the Various
[23] S. Li, Y. Lou, B. Liu, Bluetooth Aided Mobile Phone                   Sources Data Consistency for IoT Sensors, in: IEEE 9th
     Localization, ACM Transactions on Embedded                            International      Conference     on     Problems     of
     Computing Systems (TECS), 13(4) (2014) 1–15. doi:                     Infocommunications, Science and Technology (2023)
     10.1145/2560018.                                                      522–526. doi: 10.1109/PICST57299.2022.10238518.
[24] L.-J. Chen, H.-H. Hung, A Two-State Markov-Based                 [38] V. Sokolov, P. Skladannyi, N. Mazur, Wi-Fi Repeater
     Wireless Error Model for Bluetooth Networks,                          Influence on Wireless Access, in: IEEE 5th
     Wireless Personal Communications, 58(4) (2009) 657–                   International Conference on Advanced Information
     668. doi: 10.1007/s11277-009-9899-5.                                  and Communication Technologies (2023) 33–36. doi:
[25] R. Razavi, M. Fleury, M. Ghanbari, Deadline-Aware                     10.1109/AICT61584.2023.10452421.
     Video Delivery in a Disrupted Bluetooth Network,                 [39] V. Sokolov, P. Skladannyi, V. Astapenya, Wi-Fi
     IEEE       Sarnoff      Symposium         (2007).   doi:              Interference Resistance to Jamming Attack, in: IEEE
     10.1109/SARNOF.2007.4567352.                                          5th International Conference on Advanced
[26] Y. Kostiuk, Y. Konstantinov, Improved Security                        Information and Communication Technologies (2023)
     Methods in 4G Networks to Provide Effective                           1–4. doi: 10.1109/AICT61584.2023.10452687.
     Protection Against Data Transmission Attacks, (Series            [40] V. Sokolov, P. Skladannyi, N. Korshun, ZigBee
     “Pedagogy”, Series “Law”, Series “Economics”, Series                  Network Resistance to Jamming Attacks, in: IEEE 6th
     “Physical and Mathematical Sciences”, Series                          International Conference on Information and
     “Technology”): Journal, 6(34) (2024).                                 Telecommunication Technologies             and    Radio
[27] S. Tahir, A Self-organizing Location and Mobility-                    Electronics      (2023)    161–165.    doi:     10.1109/
     Aware Route Optimization Protocol for Bluetooth                       UkrMiCo61577.2023.10380360.
     Wireless, Int. J. Adv. Comput. Sci. Appl. (2016). doi:           [41] V. Sokolov, P. Skladannyi, A. Platonenko, Jump-Stay
     10.14569/IJACSA.2016.070631.                                          Jamming Attack on Wi-Fi Systems, in: IEEE 18th
[28] C.-M. Chen, C.-W. Lin, Y.-C. Chen, Packet Scheduling                  International Conference on Computer Science and
     for Video Streaming over Wireless with Content-                       Information Technologies (2023) 1–5. doi:
     Aware Packet Retry Limit, in: 8th IEEE Workshop on                    10.1109/CSIT61576.2023.10324031.
     Multimedia Signal Processing (MMSP’06) (2006) 409–               [42] V. Sokolov, P. Skladannyi, V. Astapenya, Bluetooth
     414.                                                                  Low-Energy Beacon Resistance to Jamming Attack,
[29] N. Golmie, N. Chevrollier, O. Rebala, Bluetooth and                   in: IEEE 13th International Conference on Electronics
     WLAN Coexistence: Challenges and Solutions, IEEE                      and Information Technologies (2023) 270–274. doi:
     Wireless Communications, 10(6) (2003) 22–29. doi:                     10.1109/ELIT61488.2023.10310815.
     10.1109/MWC.2003.1265849                                         [43] V. Sokolov, P. Skladannyi, A. Platonenko, Video
[30] R. Razavi, et al., An Efficient Packetization Scheme for              Channel Suppression Method of Unmanned Aerial
     Bluetooth Video Transmission, Electronic Letters,                     Vehicles, in: IEEE 41st International Conference on
     42(20) (2006) 1143–1145.                                              Electronics and Nanotechnology (2022) 473–477. doi:
[31] J. H. Yoon, S.-B. Lee, S.-C. Park, Packet and                         10.1109/ELNANO54667.2022.9927105.
     Modulation Type Selection Scheme based on Channel                [44] S. K. Mohsin,      M. A. Mohammed,        H. M. Yassien,
     Quality Estimation for Bluetooth Evolution Systems,                   Developing of Bluetooth Mesh Flooding between
     IEEE Wireless Communications and Networking                           Source-Destination Linking of Nodes in Wireless
     Conference (WCNC ’04), 2 (2004) 1014–1017.                            Sensor Networks, Eastern-European Journal of
                                                                           Enterprise Technologies 6(9(114)) (2021). :
                                                                           10.15587/1729-4061.2021.248978.



                                                                137
[45] R. Razavi, M. Fleury, M. Ghanbari, Detecting
     Congestion within a Bluetooth Piconet: Video
     Streaming Response, London Communications
     Symposium (2006) 181–184.
[46] S. Rzaieva, et al., Methods of Modeling Database
     System Security, in: Cybersecurity Providing in
     Information and Telecommunication Systems, vol.
     3654 (2024) 384–390.




                                                        138