Font Size: a A A

Bluetooth Network Communications Security,

Posted on:2002-07-30Degree:MasterType:Thesis
Country:ChinaCandidate:D Z YanFull Text:PDF
GTID:2208360032457201Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Bluetooth is intended to replace cables between all sorts of electronic equipment all over the world. Bluetooth materially establishes a unified radio air interface and an open standard of control software. By those, all Bluetooth certified products are able to work together with any other Bluetooth product.Because Bluetooth uses radio waves to transfer information, it is very susceptible to attacks and due to the lack of security in today's applications. So providing secure services in those applications is an important issue.The thesis concentrates on the security mechanism, the security implementation and services of Bluetooth, which should be different from the traditional security measures of the wired world. The thesis is organized as below:In chapter 1, the background knowledge is given which is needed for study on Bluetooth security mechanism and implementation. First Bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. Next communication security is introduced according to the model of network security architecture from OSI. Finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago.In chapter 2, the security measures and mechanism are introduced and studied. It mainly includes authentication, encryption, pairing/bonding, key management defined by Bluetooth core protocol, three security modes defined by Bluetooth profile and Bluetooth security architecture defined by Bluetooth white paper.In chapter 3, the implementation of secure services in Bluetooth environment is studied deeply according to different scenarios. It first proposes the implementation methods by HCI from link layer. Then it gives some simplified management meatures in rather complex Bluetooth system such as Bluetooth protocol stacks in PC. Some advantages and weakness of Bluetooth security and improving measures are also studied primarily based on others researches at last.In chapter 4, three application examples we have done are shown to illustrate the implementation vividly. The first example and the third example are both implemented and applied in the co-operated Bluetooth project between our institute and Motorola Suzhou Design Center (MSDC), which has been successfully completed and passed the inner test and demonstration in Motorola. The second example is done for the thesis out of the project. Many ideas presented in this thesis are rooted in the project during the period.In the last part, some main achievements during my master career are given with conclusions of the thesis the same time. And future work is discussed further.
Keywords/Search Tags:Bluetooth, Security, Algorithm, Protocol. Authentication, Encryption
PDF Full Text Request
Related items