Font Size: a A A

Bluetooth Security Improvements And Achieve

Posted on:2011-08-21Degree:MasterType:Thesis
Country:ChinaCandidate:R HuFull Text:PDF
GTID:2208360308967333Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Dissertation focuses on the Bluetooth standard which in a number of key technologies for in-depth to study of Bluetooth security mechanism.And then dissertation proposed the shortcomings of Bluetooth security mechanism.At last dissertation analyze all these inadequacies and put forward the corresponding solutions. Specific studies are as follows:First, dissertation analyze the Bluetooth technology background and present research status, according to the background and present research status,point out Bluetooth technology which the way should be trends. Next ,based on Bluetooth technology by the security threat classification order, obtained Bluetooth security mechanism is a subject that have very importance and necessity of it. Then through the comparative study of the Bluetooth communication protocol and the standards network communication protocol of the similarities and differences, dissertation to arrive at an analysis of security mechanisms conducive to an in favor of level of division. Then according to this hierarchy, to study the security of the Bluetooth identification process, combined with the Bluetooth security mechanism and the Bluetooth communication protocol, dissertation obtained the security mechanism which can be hidden attacks and vulnerabilities lie, and analyze each of these risks and vulnerabilities lie, pointing out the causes and solutions of these. When there is no better solution for the pitfalls and loopholes, such as identification process using stream cipher encryption algorithm lead to the result of hidden dangers, dissertation propose use of block cipher encryption algorithm to enhance security measures for the Bluetooth system.In the above study, dissertation analyzed the stream ciphers and the block cipher s'algorithm principle, through compare with their advantages and disadvantages, and in accordance with the actual situation of the Bluetooth mobile systems, proposed a point of view that block cipher encryption algorithm should be used on encrypt the underlying Bluetooth protocol. Then select from three kinds of the block cipher encryption algorithm what in the light of the safety and practicality, in the analysis of the basis of the three encryption algorithm, modify or reduce encryption algorithm to streamline their processes to better meet the actual system Bluetooth mobile systems computing power, storage space and network throughput. Finally, according to these processes, dissertation complice various encryption and decryption algorithm's module which achieve Bluetooth communication technology in the application layer software design, on a different encryption algorithm uses a different emphasis on the software simulation to test, after the test, give the results to validate the block cipher encryption algorithm for the superiority of the stream cipher encryption algorithm.
Keywords/Search Tags:Bluetooth, wireless networking, communication protocols, stream ciphers, block cipher
PDF Full Text Request
Related items