Design, Implementation, and Evaluation of Bluetooth Security
نویسندگان
چکیده
Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. This article provides a study on the security issues behind the Bluetooth standard. After a overview of the general Bluetooth protocol, a security framework is introduced for the description of the Bluetooth security layout. Then both link-level and service-level security schemes are discussed in detail on the basis of the framework. Some weaknesses of the Bluetooth security strategies are analysed, together with potential risks and possible attacks against the vulnerabilities. Corresponding countermeasures are also proposed in order to improve the Bluetooth security.
منابع مشابه
Performance Analysis of SAFER+ and Triple DES security algorithms for Bluetooth Security Systems
In this paper, comparison of the SAFER+ encryption algorithm and Triple DES algorithm for Bluetooth security systems is done. Performance of the above security algorithms are evaluated based on the efficiency of the algorithm. The whole design was captured entirely in matlab. In order to check the efficiency of the algorithm, noise is being added to the encrypted data and the output is seen to ...
متن کاملA Proposed Bluetooth Service-level Security
Bluetooth security has become increasingly important since Bluetooth is going to be used as a standard technology in wireless personal communication. This is especially true for Bluetooth applications that require strong security policies, e.g. mobile commerce applications. In this paper, a Bluetooth service-level security that allows easy implementation of flexible access policies is proposed....
متن کاملDesign and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet
This paper describes our concept, design and current implementation of the Secure Mobile Wallet. Mobile Wallet is an application stored in mobile phones providing to subscribers the possibility to perform various mobile financial transactions. In our approach Secure Mobile Wallet is stored and running in the Javacard SIM chip, called UICC module. The Wallet comprises several Javacard applets su...
متن کاملHardware Implementation of Dynamic S-BOX to Use in AES Cryptosystem
One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...
متن کاملBluetooth Based Home Automation and Security System Using ARM9
-Today we are living in 21 century where automation is playing important role in human life. Home automation allows us to control household appliances like light, door, fan, AC etc. It also provides home security and emergency system to be activated. Home automation not only refers to reduce human efforts but also energy saving and time efficiency. The main objective of home automation and secu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002