Security in Bluetooth Networks and Communications

Lei Chen, Peter Cooper, Qingzhong Liu

Research output: Contribution to book or proceedingChapter

4 Scopus citations

Abstract

This chapter is concerned with security management in Bluetooth communication. The chapter begins with description of the development of Bluetooth and its technical specifications. It continues with a discussion of the various network structures that can be developed through Bluetooth. A discussion of Bluetooth security goals leads to a description of the different security models available. We conclude with a discussion of the more prevalent attacks on Bluetooth security and the most widely used procedures for mitigating such attacks.
Original languageAmerican English
Title of host publicationWireless Network Security: Theories and Applications
DOIs
StatePublished - 2013

Disciplines

  • Databases and Information Systems

Keywords

  • Authentication stage
  • Enhance data rate
  • Master device
  • Near field communication
  • Security mode

Fingerprint

Dive into the research topics of 'Security in Bluetooth Networks and Communications'. Together they form a unique fingerprint.

Cite this