Mavrogiannopoulos, 2005 - Google Patents
On Bluetooth. SecurityMavrogiannopoulos, 2005
View PDF- Document ID
- 8209183100902421572
- Author
- Mavrogiannopoulos N
- Publication year
- Publication venue
- December 2005
External Links
Snippet
In this paper we discuss several aspects of the security of Bluetooth. Apart from security, several privacy issues linked to the use of Bluetooth protocols are also discussed. The focus is on the lower layer protocols, called the core Bluetooth protocols, thus security aspects of …
- 238000000034 method 0 description 22
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hager et al. | An analysis of Bluetooth security vulnerabilities | |
| Jakobsson et al. | Security weaknesses in Bluetooth | |
| Vainio | Bluetooth security | |
| Boyle et al. | Securing Wireless Sensor Networks: Security Architectures. | |
| Gehrmann et al. | Bluetooth security | |
| KR101019300B1 (en) | Method and system for secure processing of authentication key element in ad hoc wireless network | |
| KR20100103721A (en) | Method and system for mutual authentication of nodes in a wireless communication network | |
| CN101371491A (en) | Method and arrangement for the creation of a wireless mesh network | |
| JP2009533932A (en) | Channel coupling mechanism based on parameter coupling in key derivation | |
| Yüksel et al. | Zigbee-2007 security essentials | |
| Park et al. | Security protocol for IEEE 802.11 wireless local area network | |
| Hager et al. | Demonstrating vulnerabilities in bluetooth security | |
| Haataja | Security threats and countermeasures in Bluetooth-enabled systems | |
| CN105848140A (en) | Safe end-to-end establishment method capable of achieving communication supervision in 5G network | |
| Singelée et al. | Location privacy in wireless personal area networks | |
| Lamm et al. | Bluetooth wireless networks security features | |
| JP2005323149A (en) | Wireless communication system | |
| Mavrogiannopoulos | On Bluetooth. Security | |
| Sun et al. | Design, implementation, and evaluation of Bluetooth security | |
| Chen et al. | Security in Bluetooth networks and communications | |
| Singelée et al. | Improved pairing protocol for Bluetooth | |
| Shrivastava | Analysis of security risks in Bluetooth | |
| Hämäläinen | Cryptographic security designs and hardware architectures for wireless local area networks | |
| Spence et al. | Security of Wireless Technologies: IEEE 802.11 Wireless LAN and IEEE 802.15 Bluetooth | |
| Sharmila et al. | A Proposed SAFER plus security algorithm using Fast Walsh Hadamard transform for Bluetooth technology |