Security in bluetooth networks and communications

Research output: Contribution to book or proceedingChapterpeer-review

4 Scopus citations

Abstract

This chapter is concerned with security management in Bluetooth communication. The chapter begins with description of the development of Bluetooth and its technical specifications. It continues with a discussion of the various network structures that can be developed through Bluetooth. A discussion of Bluetooth security goals leads to a description of the different security models available. We conclude with a discussion of the more prevalent attacks on Bluetooth security and the most widely used procedures for mitigating such attacks.
Original languageEnglish
Title of host publicationWireless Network Security
Subtitle of host publicationTheories and Applications
PublisherSpringer-Verlag Berlin Heidelberg
Pages77-94
Number of pages18
Volume9783642365119
ISBN (Electronic)9783642365119
ISBN (Print)3642365108, 9783642365102
DOIs
StatePublished - Jun 1 2013

Scopus Subject Areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Security in bluetooth networks and communications'. Together they form a unique fingerprint.

Cite this