Bluetooth Security

Author:   Christian Gehrmann ,  Joakim Persson ,  Ben Smeets
Publisher:   Artech House Publishers
Edition:   Unabridged edition
ISBN:  

9781580535045


Pages:   222
Publication Date:   31 May 2004
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $234.96 Quantity:  
Add to Cart

Share |

Bluetooth Security


Add your own review!

Overview

Bluetooth technology is becoming a popular way to furnish short-range wireless interconnectivity as an alternative to existing wire applications or as an enabling technology for new ones. With the number of Bluetooth-equipped consumer and industry devices rapidly increasing, it stands on the threshold of global deployment. This first of its kind book, from expert authors actively contributing to the evolution of Bluetooth, provides an overview and detailed description of all the security functions and features of this technology's latest core release.

Full Product Details

Author:   Christian Gehrmann ,  Joakim Persson ,  Ben Smeets
Publisher:   Artech House Publishers
Imprint:   Artech House Publishers
Edition:   Unabridged edition
Dimensions:   Width: 15.20cm , Height: 1.30cm , Length: 22.90cm
Weight:   0.454kg
ISBN:  

9781580535045


ISBN 10:   1580535046
Pages:   222
Publication Date:   31 May 2004
Audience:   General/trade ,  Professional and scholarly ,  General ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Preface; Part I: Bluetooth Security Basics ; Introduction - Background. Bluetooth Basics. Security Basics.; Overview of Bluetooth Security Architecture - Purpose. Architecture. Security Modes.; Key Management - Pairing According to 1.1. Key Types. Usage., Link Protection , Key Data Bases.; Algorithms -Introduction to Crypto Algorithms. SAFER+. Bluetooth Encryption E0.; Broadcast Encryption - Overview. Key Size Negotiation. Switching to Broadcast Encryption.; Security Policies and Access Control - Security Manager Architecture.; Attacks, Weaknesses and Strengths - Eavesdropping. Impersonation. Man in the Middle Attacks. Key Storage. Unit Key. Location Tracking.; Part II: Bluetooth Security Enhancements; Introducing Anonymity - Overview, Inquiry and Paging. Modes.; Key Management Extensions - Improved Pairing. Higher Layer Key Exchange. Personal CA.; Security for Bluetooth Applications - Profiles.;

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List