[go: up one dir, main page]

Mavrogiannopoulos, 2005 - Google Patents

On Bluetooth. Security

Mavrogiannopoulos, 2005

View PDF
Document ID
8209183100902421572
Author
Mavrogiannopoulos N
Publication year
Publication venue
December 2005

External Links

Snippet

In this paper we discuss several aspects of the security of Bluetooth. Apart from security, several privacy issues linked to the use of Bluetooth protocols are also discussed. The focus is on the lower layer protocols, called the core Bluetooth protocols, thus security aspects of …
Continue reading at members.hellug.gr (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
Hager et al. An analysis of Bluetooth security vulnerabilities
Jakobsson et al. Security weaknesses in Bluetooth
Vainio Bluetooth security
Boyle et al. Securing Wireless Sensor Networks: Security Architectures.
Gehrmann et al. Bluetooth security
KR101019300B1 (en) Method and system for secure processing of authentication key element in ad hoc wireless network
KR20100103721A (en) Method and system for mutual authentication of nodes in a wireless communication network
CN101371491A (en) Method and arrangement for the creation of a wireless mesh network
JP2009533932A (en) Channel coupling mechanism based on parameter coupling in key derivation
Yüksel et al. Zigbee-2007 security essentials
Park et al. Security protocol for IEEE 802.11 wireless local area network
Hager et al. Demonstrating vulnerabilities in bluetooth security
Haataja Security threats and countermeasures in Bluetooth-enabled systems
CN105848140A (en) Safe end-to-end establishment method capable of achieving communication supervision in 5G network
Singelée et al. Location privacy in wireless personal area networks
Lamm et al. Bluetooth wireless networks security features
JP2005323149A (en) Wireless communication system
Mavrogiannopoulos On Bluetooth. Security
Sun et al. Design, implementation, and evaluation of Bluetooth security
Chen et al. Security in Bluetooth networks and communications
Singelée et al. Improved pairing protocol for Bluetooth
Shrivastava Analysis of security risks in Bluetooth
Hämäläinen Cryptographic security designs and hardware architectures for wireless local area networks
Spence et al. Security of Wireless Technologies: IEEE 802.11 Wireless LAN and IEEE 802.15 Bluetooth
Sharmila et al. A Proposed SAFER plus security algorithm using Fast Walsh Hadamard transform for Bluetooth technology