Bluetooth Security

Product Description
This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and features of this standard’s latest core release. After categorizing all the security issues involved in ad hoc networking, this hands-on volume shows you how to design a highly secure Bluetooth system and implement security enhancements. The book also helps you fully un… More >>

Bluetooth Security

1 reply
  1. John R. Vacca says:

    It can be argued that the simple wireless connectivity Bluetooth offers is attractive. All of this cannot be denied, since Bluetooth-equipped devices have found their way into quite different environments and are used for a wide range of applications. Authors Christian Gehrmann, Joakim Persson and Ben Smeets have done an outstanding job of telling the movers and shakers of industry that the security aspects must be carefully analyzed in order to decide whether Bluetooth technology indeed provides the right solution for a particular task.

    Gehrmann, Persson and Smeets begin this book by explaining why it is quite hard to grasp how the different security functions fit together from just reading the specifications. Next, the authors give an overview of the whole Bluetooth security architecture. Then, they describe Bluetooth key management. The authors then give a detailed description of the algorithms and the design principles behind them. Next, they describe the broadcast function in detail. They also describe how access control mechanisms can be dealt with in a Bluetooth system. In addition, the authors also describe the various attacks on Bluetooth security. Next, the authors describe how location tracking can be avoided by introducing an anonymity mode. They also suggest several key management improvements and extensions. Finally, the authors deal with security for a set of Bluetooth applications.

    With the preceding in mind, the authors have done an excellent job of discussing the security functionality defined on the basis of the Bluetooth specifications. At the end of the day, you’ll find that this Bluetooth book has gone where no other Bluetooth books have gone before, by providing a very detailed description of security related aspects of Bluetooth technology.
    Rating: 5 / 5

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.