Objectives Of Security: An Overview Of Bluetooth Security

778 Words2 Pages

Objectives of security:
So security is most important part of any system. To protects user’s data from theft or lost; so Bluetooth claims some security objectives like access control based on link layer. Ensures that device authentication is being secret, only authorized user can access it. Confidentially about exchanging information cannot be disclosed publically and integrity detect the modified data and ensures that data may not be changed/delete or modified.

Over view of Bluetooth Security:
Symmetric encryption process is use in Bluetooth; therefore decryption is done on same process, by using same key during encryption and decryption and the exchange of secret key must be done in advance.
Four entities are used to maintain the security on link layer is:
• The address of device is using 48bits BD_ADDR.
• It can use 128bits authentication link key.
• The encryption key is gained from the authentication key so every time new secret key is 8-128Bits is being generated due to activation of encryption on each time.
• Every transaction of each device, pseudo-random number is generated which is of 128Bits.

Checking of integrity:
Channel access code may check the packets for errors or wrong delivery, by HEC in header and CRC in data payload it can be done in three steps. Where, the packets may have, shortened access code in first step, in second step it has access code and packet header, while in last third step it has access code, packet header and pay load. However, every packet begins with data access code it is used for synchronization, DC offset compensation and identification so it can examine in exchanged all packets on physical channel. Header error check is an 8-bit code which can check the header integrity and the payload...

... middle of paper ...

...device or moving out of range.

Solutions:
There is no such guarantee to stop these attacks. Whereas, installation of some fire walls and antivirus may prevent these attacks which can be schedule updated. It can prevent device for interference of any unwanted files which can cause threat like worm, Trojan, virus etc that can cause there security issues. Do not give access to unwanted files. So it is important to look after our system devices time to time. Many devices like printer, mobiles also CCTv cameras are based on this technology so it can cause big security issues.

Conclusion:
In the nutshell every coin has two sides, as like other systems no matter Bluetooth may also have some security issues. But it can introduce this world a new wireless technology and personal area network as well as many devices can communicate with each other through Bluetooth.

More about Objectives Of Security: An Overview Of Bluetooth Security

Open Document