Design and implementation of Bluetooth security software

3,000.003,200.00 (-6%)

Sold By: Brilliantng

In stock

SKU: computer83761 Category: Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Report Abuse
Help us Grow
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Abstract Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad-hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. This article provides a study on the security issues behind the Bluetooth standard. After an overview of the general Bluetooth protocol, a security framework is introduced for the description of the Bluetooth security layout. Then both link-level and service-level security schemes are discussed in detail on the basis of the framework. Some weaknesses of the Bluetooth security strategies are analyzed, together with potential risks and possible attacks against the vulnerabilities. Corresponding countermeasures are also proposed in order to improve the Bluetooth security.

0/5 (0 Reviews)
0/5 (0 Reviews)
Be the first to review “Design and implementation of Bluetooth security software”

Your email address will not be published.

Reviews

There are no reviews yet.

Vendor Information

  • Store Name: Brilliantng
  • Vendor: Brilliantng
  • No ratings found yet!

Main Menu

Design and implementation of Bluetooth security software

3,000.003,200.00 (-6%)

Add to Cart
%d bloggers like this: