A Design Approach for Wireless Communication Security in Bluetooth Network

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Approach to Enhance the Security Lapses in Bluetooth Wireless Network Communication

This work proposes an approach to enhance the security lapses that are present in data exchange process of Bluetooth. The paper begins with analyzing both the advantages and risks of mobile devices and wireless networks that can be brought to today’s businesses. The paper continues the analysis who in an organization should take on the responsibility to mitigate the risks related to mobile devi...

متن کامل

New Algorithm for Wireless Network Communication Security

This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by usin...

متن کامل

Design of a novel congestion-aware communication mechanism for wireless NoC architecture in multicore systems

Hybrid Wireless Network-on-Chip (WNoC) architecture is emerged as a scalable communication structure to mitigate the deficits of traditional NOC architecture for the future Multi-core systems. The hybrid WNoC architecture provides energy efficient, high data rate and flexible communications for NoC architectures. In these architectures, each wireless router is shared by a set of processing core...

متن کامل

Wireless communication network design in IC factory

A wireless local area network (WLAN) is designed for an IC factory in Hong Kong using the hierarchical genetic algorithm (HGA). The HGA is capable of handling multiobjective functions and discrete constraints. Because of this uniqueness, together with the adopting of a Pareto ranking scheme, a solution can be reached even when skewed multiobjective functions and constraints confinements are bei...

متن کامل

A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX

As wireless networks are finally coming of age, people and organizations start to implement critical applications and infrastructures based on them. As most wireless network standards have been designed with security as an afterthought, severe security shortcomings were the results and several improvements and amendments were necessary to fix the worst. Founded on a series of insecure implement...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security and Its Applications

سال: 2014

ISSN: 1738-9976,1738-9976

DOI: 10.14257/ijsia.2014.8.2.35