Cover image for Bluetooth Security.
Bluetooth Security.
Title:
Bluetooth Security.
Author:
Gehrmann, Christian.
ISBN:
9781580538855
Personal Author:
Physical Description:
1 online resource (221 pages)
Contents:
Bluetooth Security -- Contents v -- Preface xi -- Part I: Bluetooth Security Basics 1 -- 1 Introduction 3 -- 1.1 Bluetooth system basics 3 -- 1.2 Bluetooth security basics 19 -- References 25 -- 2 Overview of the Bluetooth Security Architecture 27 -- 2.1 Key types 27 -- 2.2 Pairing and user interaction 29 -- 2.3 Authentication 30 -- 2.4 Link privacy 31 -- 2.5 Communication security policies 37 -- References 42 -- 3 Bluetooth Pairing and Key Management 43 -- 3.1 Pairing in Bluetooth 43 -- 3.2 HCI protocol 44 -- 3.3 LM protocol 45 -- 3.4 Baseband events 46 -- 3.5 User interaction 53 -- 3.6 Cipher key generation 54 -- 3.7 Key databases 58 -- References 63 -- 4 Algorithms 65 -- 4.1 Crypto algorithm selection 65 -- 4.2 SAFER+ 67 -- 4.3 Encryption engine 73 -- 4.4 Ciphering algorithm E 74 -- 4.5 Implementation aspects 79 -- References 80 -- 5 Broadcast Encryption 81 -- 5.1 Overview 81 -- 5.2 Preparing for broadcast encryption 82 -- 5.3 Switching to broadcast encryption 83 -- References 85 -- 6 Security Policies and Access Control 87 -- 6.1 Objectives 87 -- 6.2 Security manager architecture 90 -- Reference 96 -- 7 Attacks, Strengths, and Weaknesses 97 -- 7.1 Eavesdropping 97 -- 7.2 Impersonation 105 -- 7.3 Pairing 107 -- 7.4 Improper key storage 109 -- 7.5 Unit key 112 -- 7.6 Location tracking 113 -- 7.7 Implementation flaws 116 -- References 117 -- Part II: Bluetooth Security Enhancements 119 -- 8 Providing Anonymity 123 -- 8.1 Overview of the anonymity mode 123 -- 8.2 Address usage 124 -- 8.3 Modes of operation 128 -- 8.4 Inquiry and paging 129 -- 8.5 Alias authentication 131 -- 8.6 Pairing 133 -- 8.7 Anonymity mode LMP commands 133 -- 8.8 Pairing example 136 -- References 138 -- 9 Key Management Extensions 139 -- 9.1 Improved pairing 140 -- 9.2 Higher layer key exchange 149 -- 9.3 Autonomous trust delegation 154 -- References 164.

10 Security for Bluetooth Applications 167 -- 10.1 Headset 168 -- 10.2 Network access 173 -- 10.3 SIM access 181 -- References 184 -- Glossary 187 -- List of Acronyms and Abbreviations 189 -- About the Authors 195 -- Index 197.
Abstract:
This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and features of this standard's latest core release. After categorizing all the security issues involved in ad hoc networking, this hands-on volume shows you how to design a highly secure Bluetooth system and implement security enhancements. The book also helps you fully understand the main security risks involved with introducing Bluetooth-based communications in your organization.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: