Font Size: a A A

An Smart Band Scheme Based On BLE Technology And A Secutiry Model In Application Layer

Posted on:2017-01-08Degree:MasterType:Thesis
Country:ChinaCandidate:R X WangFull Text:PDF
GTID:2348330518496575Subject:Electronic Science and Technology
Abstract/Summary:PDF Full Text Request
As a newly arisen class of industry in recent years,the situation of wearable devices is improving continuously.With the development of the technology of wearable devices,it causes transformations in these fields:information analysis of personal health data,clothes and decorations with sensors of different functions in them,human-computer interaction and identity authorization based on customized gestures.Human-computer interaction(HCI)means that users can interact with computers or other devices through gestures or other natural movements,replacing operations on machines with natural daily movements.Besides,gestural operations can further improve user experience.In this circumstance,the user controlled device which is connected with the smart band by a custom gesture turns into expectancy.Bluetooth 4.0 reduces the amount of broadcast channels in old versions,significantly lowering power consumption,which is the reason I chose Bluetooth 4.0 as the technology used in the wireless transmission of the band.This article uses Bluetooth 4.0 as the base of the design,insightfully discusses each layer of Bluetooth 4.0 protocol stack and realizes the design on SmartRF development board.As Bluetooth 4.0 is the same as old versions in the process of authorization,which is authorizing in the link layer without introducing the concept of user authorization,the design of user authorization in the application layer and encryption in data transmission has an important meaning for the system's security.This article discusses the security of the smart band system through the analysis of data packages transferred by the band designed in this article and those currently in the market.At the meantime,this article discusses public key system,SSL protocol,digital signature system and secure hash algorithm.In the premise of the above research,regarding to the security problem existing in current Bluetooth devices,this article designs a new security model in the application layer of Bluetooth 4.0 protocol stack,and through the bi-directional authorization mechanism in the application layer based on ECC algorithm and combined with SSL protocol realizes the user authorization function,introducing a security model for current Bluetooth devices to improve their security performance.This article realizes the security model in the smart band,by using the user level of authentication mechanism,the smart band security has been more effective to improve.
Keywords/Search Tags:smart band, controlled device, Bluetooth 4.0, identity authorization, public key, SSL protocol, digital signature, ECC algorithm
PDF Full Text Request
Related items