首页    期刊浏览 2025年05月06日 星期二
登录注册

文章基本信息

  • 标题:A Design Approach for Wireless Communication Security in Bluetooth Network
  • 本地全文:下载
  • 作者:V. Sujatha ; Anuradha Anumolu ; Debnath Bhattacharyya
  • 期刊名称:International Journal of Security and Its Applications
  • 印刷版ISSN:1738-9976
  • 出版年度:2014
  • 卷号:8
  • 期号:2
  • 页码:341-352
  • DOI:10.14257/ijsia.2014.8.2.35
  • 出版社:SERSC
  • 摘要:Exponential growth of the volume of Bluetooth-enabled devices indicates that it has turned into a mainstream method for remote interconnections for trading data. Bluetooth technology has turned into a vital piece of this advanced society. The accessibility of cellular telephones, diversion controllers, Personal Digital Assistant (PDA) and Personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes wide spread boundless, vulnerabilities in its security protocols are expanding which can be possibly hazardous to the protection of individual data of client. It is the sort of remote Ad hoc system. Ease, low power, low many-sided quality and strength are the fundamental gimmicks of Bluetooth. It takes a shot at Radio recurrence. Bluetooth correspondence extent is sorted as high, medium and low relying on force level. High scope of Bluetooth correspondence is dependent upon 91 meter, medium extent is dependent upon 9 meter and low range is dependent upon 1 meter. Bluetooth is an as of late proposed convention for nearby remote correspondence and has turned into a true standard for short-extend impromptu radio associations. Security concern is a standout amongst the most imperative issues deferring the mass selection of Bluetooth. This article gives a study on the security issues behind the Bluetooth standard. After an outline of the general Bluetooth convention, a security system is presented for the depiction of the Bluetooth security design. At that point both connection level and administration level security plans are talked about in subtle element on the premise of the system. A few shortcomings of the Bluetooth security systems are investigated, together with potential dangers and conceivable assaults against the vulnerabilities. Comparing countermeasures are additionally proposed so as to enhance the Bluetooth security.
  • 关键词:Bluetooth Security; WPAN; PDA; Bluetooth Protocol; RF; L2CAP; ; RFCOMM; LMP
国家哲学社会科学文献中心版权所有