Font Size: a A A

Cryptanalysis And Improvement Of Bluetooth File Transportation On Mobile Phones

Posted on:2013-06-21Degree:MasterType:Thesis
Country:ChinaCandidate:L Z WangFull Text:PDF
GTID:2248330395480678Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Mobile communication technology has become A shining star in the field of information.And the Bluetooth technology is especially eye-catching in the third generation mobilecommunication system. As a short range wireless communication technology, Bluetoothtechnology plays an increasingly important role in resource sharing. Bluetooth technology hasbroad prospects and huge business opportunities in the advent of a few years. With the help ofBluetooth technology, the Bluetooth mobile phones and other terminal equipment can beachieved within short distance. However, the safety performance of the Bluetooth mobile phonehas also caused wide public concern over the recent years. As a result, ensuring the data secure inthe phone Bluetooth network becomes a new task to be urgently solved. In this paper we studiedthe Bluetooth network security mechanisms, and solve three data security issues in the Bluetoothmobile phone network, and completed the relevant program.In object exchange protocol, the files are transferred through Bluetooth object exchanging,To prevent the leakage of sensitive information by accident or maliciously, we use functioninterception technology to improve the Bluetooth file transferring process and the security ofsensitive information in high level protocol.By analyzing the Security mechanism of the link layer protocol, we transform the personalidentification number (Personal Identification Number, PIN) value program, and thus enhancethe security of sensitive information in high level protocol.In the link layer protocol, we analyzed the Bluetooth phone certifying process and presentan existing flaw of the process. We present a strategy to resist the man-in-the-middle attack,which improve the the security of certification in the link layer.
Keywords/Search Tags:Bluetooth mobile phones network, OBEX protocol, file transport monitor, PINcode, man in the middle attack
PDF Full Text Request
Related items