Security protocols in Bluetooth Standard
ثبت نشده
چکیده
منابع مشابه
A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols
A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main characteristics and performances in terms of some metric such as co-existence, data rate, secur...
متن کاملOn Bluetooth security
In this paper we discuss several aspects of the security of Bluetooth. Apart from security, several privacy issues linked to the use of Bluetooth protocols are also discussed. The focus is on the lower layer protocols, called the core Bluetooth protocols, thus security aspects of application profiles are left out of the scope of this document. We give a summary of the networking protocols of Bl...
متن کاملB LUETOOTH S ECURITY T HREATS AND S OLUTIONS : A SURVEY Nateq Be - Nazir
Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentia...
متن کاملSecurity of Wireless Technologies: IEEE 802.11 Wireless LAN and IEEE 802.15 Bluetooth
Wireless LAN (WLAN) is set of protocols defined by the Institute of Electrical and Electronics Engineers in the IEEE 802.11 standard[2]. This standard is itself made up of a number of substandards, allowing different speeds and technologies. Overall, most of the sub-standards of IEEE 802.11, including WLAN, use the same systems for security with only the latest revisions having any substantial ...
متن کاملOn Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using symmetric-key cryptography for cost reasons. The consequence is that common daily used security protocols such as Bluetooth pairing are insecure in the sense that an adversary can easily extract the main private key from the proto...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007