Font Size: a A A

The Study And Realization Of The Bluetooth Security On Datalink Layer

Posted on:2006-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:D ChenFull Text:PDF
GTID:2168360155955231Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The Bluetooth shows us a low-cost, low-power, ad-hoc connectivity and wireless personal environment. With the devolopment of the technology and the appearance of the correlative products, more and more people have taken care of security of the Bluetooth technology and the correlative products. But in fact, some security bugs have been discovered in the Bluetooth products in recent years. The security of Bluetooth is an important key, which can affect whether people can accept Bluetooth. This thesis analyzes the security of the Bluetooth on the layer, points out possible security flaws and gives some advance suggestions.At first, this thesis introduces the characteristics of Bluetooth technology and the frame of Bluetooth security, then, takes an emphasis on Bluetooth security mechanism on the datalink layer. There are two parts of security on the datalink layer, one is authentication, and the other is encryption. There are some security units in each part, such as PIN (Personal Identify Number), Bluetooth address, link key, random number, and arithmetic of E0 and Ec during encryption. All are important to the security of Bluetooth.Based on analysis of Bluetooth Security performance, this thesis achieves its simulation on software, analyses each unit of security in theoretics and gives some advance suggestions. Lastly, possible attacks at E0 are analyzed in the thesis. All the work can be useful to research and development of the security mechanism of Bluetooth.
Keywords/Search Tags:Bluetooth, security, authentication, encryption, datalink layer
PDF Full Text Request
Related items