Font Size: a A A

Research And Implementation Of Security Authorization And Access Controlling Based On Bluetooth Technology

Posted on:2005-08-08Degree:MasterType:Thesis
Country:ChinaCandidate:J S ZhangFull Text:PDF
GTID:2168360152469248Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
As a telecommunication protocol, Bluetooth wireless technology ensures communication compatibility worldwide. It provides an open-standard of wireless interface and control software with a low-cost, low-power consumption solution. With industry-wide support, Bluetooth technology allows you free from wired connections--- enabling links between mobile computers, mobile phones. The study of the Bluetooth safe mandate and the access control technology is significant to the improvement of safe performance in the application of Bluetooth. To ensure the safe performance, Bluetooth offers safe mechanism in both link layer and application layer and defines 4 safe modes and 2 safe ranks for the transmission of the data. Bluetooth whitebook gives us a viable security system by standing on link layer which also put out a very flexible safe framework setting up on the Bluetooth straight link layer security. Bluetooth devices can transmit data through registration, paging, authorization and encoding. In some specific occasions, such as the Bluetooth application in the military communication , E-business as well as in the government communications, the user's authorization and the data transmission should be improved.For aiming at the globe usage, low price and tight size, bluetooth does not contain advantage technology. Bluetooth protocol has security limitation somehow, that is, the authorization of the protocol is to authorize the bluetooth devices not the users. Bluetooth protocol can sustain linking devices and can not sustain users' inter-authorization. One means to solve the problem is set a mechanism named BONDING, this mechanism can authorize users into the server or give users different right into the server just not giving the only device-authorization.
Keywords/Search Tags:Bluetooth, Secure mechanism, Link security, Security Authorization, Access Controlling
PDF Full Text Request
Related items