Font Size: a A A

Research Of Identity Authentication And Access Control Technology In Bluetooth

Posted on:2009-11-14Degree:MasterType:Thesis
Country:ChinaCandidate:L T WangFull Text:PDF
GTID:2178360278480787Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
Identity authentication and access control are the major security mechanisms to defend active attack. Although bluetooth has been extensively used in many fields such as mobile phone, headset, keyboard and mouse; further usage is restricted by the security problem in itself. Bluetooth security will get greatly improved by introducing user authentication and enhancing access control functions.Bluetooth specification and its communication characteristics are deeply researched, and also the problems and shortcomings in security are analyzed. Aiming at the problems of lacking user authentication and weak access control in bluetooth, considering related security factors and requirements of the project, the overall structure of bluetooth security application system is designed.Bluetooth communication and device authentication are studied, one way to introduce user authentication is found, and then a scheme of authentication with both device and user as identity is proposed. One user authentication protocol called S-ECSRP is designed based on the characteristics of bluetooth and its appliance. The remote device user of bluetooth connection can be identified by introducing user authentication; this solves problems caused by the user independence of bluetooth access. Experimental results demonstrate that the S-ECSRP protocol is effective and the designed scheme its practicability, which can combine the identity of user and device seamlessly.On the basis of identity reliability, a layered access control scheme is designed according to the characteristics of each protocol layer in bluetooth and the existing access control technologies. Coarse-grained control of whether the connection should be permitted or not is adopted on the HCI layer; on L2CAP and RFCOMM layers DAC with protocols as the object is used, and fine-gained MAC is achieved on the service and application layers. Experimental results show that the proposed scheme can provide more comprehensive security and get no less flexibility at the same time.With the research of identity authentication and access control, bluetooth security application system is implemented based on BlueZ stack, both on personal computer and on the embedded security platform. The system comprises three main functional modules, which are registration-authorization, identity authentication and access control.
Keywords/Search Tags:Bluetooth Security, Identity Authentication, Access Control, Authentication Protocol, BlueZ
PDF Full Text Request
Related items