Font Size: a A A

Research Of Several Problems On The Data Security System Of Bluetooth Network

Posted on:2010-06-10Degree:MasterType:Thesis
Country:ChinaCandidate:L M WangFull Text:PDF
GTID:2178330332978513Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As a short range wireless communication technology, Bluetooth is playing a more and moreimportant role in achieving resource sharing. Bluetooth can implement the communicationbetween PC and mobile communication terminals or among the internet, consequently make thedata transmission between the equipment more swift and efficient.With the widely used of Bluetooth, Bluetooth network security has become an urgentproblem to be solved. For the risk that exists in the Bluetooth network, this article has researchedon three problems in the Bluetooth network data security system and then putting forwardeffective solutions and achieve them.1) For the possible attack problems when user inputting the PIN code, after analyzing thePIN code security of Bluetooth, from the user's point of view, we put forward a method thatpresenting three Steps'transforming before the E22 algorithm to increase the PIN code'scomplexity. This method enable the PIN code's to a higher security length of 16 Bytes, therebyimprove the PIN code security.2) Due to the man in the middle attack in the Bluetooth certification, by analyzing itsprinciple and process, the article puts forward some methods which are the combination methodof transformed PIN code encryption, message digest and additional time-stamp to defend fromthe attacks. That has improved security in the authentication process.3) For preventing users from leaking sensitive information through Bluetooth file transportmode, by analyzing the transport principle, the article put forward the combination using ofinline HOOK and remote thread injection technology to implement monitoring and filtering tothe Bluetooth file transport, consequently ensuring the safety in the process of Bluetooth filetransport.By researching the three problems in the data security system mentioned above, Bluetoothnetwork improves its immune ability to the external attacks and prevents leaking the sensitiveinformation inside the network. The functions of the data security system have been perfected.
Keywords/Search Tags:Bluetooth network, PIN code, man in the middle attack, OBEX protocol, filetransport monitor
PDF Full Text Request
Related items