Abstract
This chapter is concerned with security management in Bluetooth communication. The chapter begins with description of the development of Bluetooth and its technical specifications. It continues with a discussion of the various network structures that can be developed through Bluetooth. A discussion of Bluetooth security goals leads to a description of the different security models available. We conclude with a discussion of the more prevalent attacks on Bluetooth security and the most widely used procedures for mitigating such attacks.
| Original language | English |
|---|---|
| Title of host publication | Wireless Network Security |
| Subtitle of host publication | Theories and Applications |
| Publisher | Springer-Verlag Berlin Heidelberg |
| Pages | 77-94 |
| Number of pages | 18 |
| Volume | 9783642365119 |
| ISBN (Electronic) | 9783642365119 |
| ISBN (Print) | 3642365108, 9783642365102 |
| DOIs | |
| State | Published - Jun 1 2013 |
Scopus Subject Areas
- General Computer Science