Skip to main content
Contribution to Book
Security in Bluetooth Networks and Communications
Wireless Network Security: Theories and Applications (2013)
  • Lei Chen, Georgia Southern University
  • Peter A. Cooper, Sam Houston State University
  • Qingzhong Liu, Sam Houston State University
Abstract
This chapter is concerned with security management in Bluetooth communication. The chapter begins with description of the development of Bluetooth and its technical specifications. It continues with a discussion of the various network structures that can be developed through Bluetooth. A discussion of Bluetooth security goals leads to a description of the different security models available. We conclude with a discussion of the more prevalent attacks on Bluetooth security and the most widely used procedures for mitigating such attacks.
Keywords
  • Near field communication,
  • Security mode,
  • Master device,
  • Enhance data rate,
  • Authentication stage
Publication Date
2013
Editor
Lei Chen, Jiahuang Ji, and Zizhong Zhang
Publisher
Springer, Berlin, Heidelberg
ISBN
978-3-642-36511-9
DOI
10.1007/978-3-642-36511-9_5
Citation Information
Lei Chen, Peter A. Cooper and Qingzhong Liu. "Security in Bluetooth Networks and Communications" Wireless Network Security: Theories and Applications (2013) p. 77 - 94
Available at: http://works.bepress.com/lei-chen/44/