Font Size: a A A

Research And Implementation On The Embedded Bluetooth Transmission System Security Mechanism

Posted on:2016-03-09Degree:MasterType:Thesis
Country:ChinaCandidate:Z LiFull Text:PDF
GTID:2348330485455161Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The Bluetooth media is media way of mass groups. With various have Bluetooth software equipment in specific areas of advertising, let the brand and audience efficient and accurate interaction and communication. At present, in new media of mobile phone for receiving terminal way is being born, and in a stage of rapid development, experts call it the "fifth media". Bluetooth media entertainment provided by carrying advertising has a strong vitality, has the incomparable information copied and disseminated again, with accurate information feedback function. Due to numerous mobile Bluetooth devices such as mobile phones, portable computer, PDA, can be convenient to receive the data, we combine the Bluetooth technology and embedded technology, developed a proprietary products, used to send data to promote the development of Bluetooth communication. Bluetooth is a broad prospect of wireless communication technology, has a huge market space and potential, the research and application of the technique development has important significance. The traditional media to People's Daily life provides a great convenience, but there are still many consume resources more way of media, such as propaganda, or no permanent effect, and waste of resources. If using a Bluetooth wireless transmission technology and the advanced embedded technology to develop a set of the combination of Bluetooth wireless data transmission system, and made it a practical and useful commercial software, make the Bluetooth file transfer, the network file transfer, for the advertising industry, and other information industry to provide a more broad space for development, it will have good market prospects. Bluetooth is a short-range wireless communication technology, using Bluetooth technology can effectively simplify the handheld computers, laptops and mobile phones and other mobile communications terminal equipment, and the communication between the equipment and the Internet, thus make the modern communication equipment and data transmission between the Internet become more rapid, efficient, to broaden the way with wireless communications. The Bluetooth communication technology has many advantages, but the Bluetooth communication technology there are still some hidden trouble in safety. Due to the mobility and openness of Bluetooth system, it is particularly important to the security problem of its.Under the Linux system is mainly studied in this paper the Bluetooth protocol stack, completed under the HCI protocol tool scanning of the Bluetooth devices, studies the Bluetooth connection and matching process of equipment under Linux, the security mechanism of Bluetooth has carried on the deep step of exploration, and put forward the DES data encryption method in the application of Bluetooth devices. Full text is divided into six chapters. Specific content is as follows: the first chapter is the introduction part; this paper introduces the basic situation of Bluetooth, the origin of Bluetooth, Bluetooth technology and Bluetooth security product development present situation analysis, analysis of the status quo. The second chapter of Bluetooth technology has carried on the detailed introduction. Analyses the key technology of Bluetooth, Bluetooth technology index and system parameters is given, and studies the Bluetooth communication protocol stack, expounds the technical features and application of Bluetooth. The third chapter is the introduction to the Bluetooth scanner and simulation and the analysis of the results. The fourth chapter analyses the Bluetooth security system, tells the story of low-level security mechanism of Bluetooth and the high-level security mechanism, risk and threat of Bluetooth system are analyzed, the Bluetooth security analysis is given and the suggestion. Chapter v based on Bluetooth encryption DES algorithm is described, the software simulation and analysis of the results. The sixth chapter is conclusion.
Keywords/Search Tags:Bluetooth technique, scan, Linux, Security mechanism, DES
PDF Full Text Request
Related items