...
首页> 外文期刊>Computing reviews >Bluetooth security attacks: comparative analysis, attacks, and countermeasures
【24h】

Bluetooth security attacks: comparative analysis, attacks, and countermeasures

机译:蓝牙安全攻击:比较分析,攻击和对策

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

People routinely use Bluetooth headsets with their mobile phones without thinking. The tedium of pairing is largely a thing of the past, and Bluetooth for mobile devices is now ubiquitous. With that familiarity, however, comes risk. Very few people stop to think about the security of their Bluetooth communications and what it would mean should those communications be disrupted, intercepted, or otherwise compromised. The authors of this book, however, are just such people. Chapter 1 gives a brief introduction to Bluetooth communications and outlines the authors' goals in writing the book. The basic security mechanisms and configuration within Bluetooth are examined in some detail in chapter 2. The four Bluetooth security modes, as well as device addressing, pairing, authentication, and encryption, are discussed. Chapter 3 reveals the known vulnerabilities with Bluetooth security. Various weaknesses in encryption and device configuration are explored.
机译:人们通常不加思索地将蓝牙耳机与手机一起使用。繁琐的配对在很大程度上已经成为过去,而移动设备的蓝牙技术现在无处不在。然而,随着这种熟悉,风险随之而来。很少有人停下来思考其蓝牙通信的安全性,以及如果这些通信被中断,拦截或以其他方式受到损害意味着什么。但是,这本书的作者就是这样的人。第1章简要介绍了蓝牙通信,并概述了作者编写本书的目标。在第2章中详细介绍了蓝牙中的基本安全机制和配置。讨论了四种蓝牙安全模式以及设备寻址,配对,认证和加密。第3章揭示了蓝牙安全性的已知漏洞。探索了加密和设备配置中的各种弱点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号