Abstract
This chapter is concerned with security management in Bluetooth communication. The chapter begins with description of the development of Bluetooth and its technical specifications. It continues with a discussion of the various network structures that can be developed through Bluetooth. A discussion of Bluetooth security goals leads to a description of the different security models available. We conclude with a discussion of the more prevalent attacks on Bluetooth security and the most widely used procedures for mitigating such attacks.
Original language | American English |
---|---|
Title of host publication | Wireless Network Security: Theories and Applications |
DOIs | |
State | Published - 2013 |
Disciplines
- Databases and Information Systems
Keywords
- Authentication stage
- Enhance data rate
- Master device
- Near field communication
- Security mode