
Bluetooth Security
Christian Gehrmann, Joakim Persson, Ben Smeets - Collection Internet/Computer Security
Résumé
This first-of-its-kind book, written by expert authors who actively contribute to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and features of this standard latest core release. After categorizing all the security issues involved in ad hoc networking, this hands-on volume explains how to design a highly secure Bluetooth system and implement security enhancements. The book also helps practitioners fully understand the main security risks involved with introducing Bluetooth-based communications in their organizations.
This cutting-edge resource examines the most significant attacks on Bluetooth security mechanisms and their implementations, demonstrating how some of these known weaknesses can be avoided with appropriate defensive measures. The book presents concrete examples of how to design security solutions for some Bluetooth applications and products built on these applications. Professionals find real-world case studies including technical algorithms, mechanisms and protocols, and security architectures. These architectures offer valuable guidelines for use in building Bluetooth and non-Bluetooth-specific security mechanisms.
L'auteur - Christian Gehrmann
Christian Gehrmann is a senior specialist in security architectures and protocols for Ericsson Mobile Platforms AB. He was formerly the chairman of the Bluetooth SIG Security Expert Group. Dr. Gehrmann holds a Ph.D. in information theory and an M.Sc. in electrical engineering from Lund University.
L'auteur - Joakim Persson
Joakim Persson is a technical manager of new technology in the research department of Ericsson Mobile Platforms AB. He has been playing an active role in the Bluetooth SIG Radio Working Group for many years. Dr. Persson holds a Ph.D. in information theory and an M.Sc. in computer engineering from Lund University.
L'auteur - Ben Smeets
Ben Smeets is an Ericsson expert in security systems and data compression at Ericsson Mobile Platforms AB. He is also a full professor in digital switching theory at Lund University. Dr. Smeets holds a Decent degree and Ph.D. in digital techniques from Lund University and an M.Sc. in electrical engineering from Eindhoven University of Technology.
Sommaire
- Bluetooth Security Basics
- Introduction
- Overview of the Bluetooth Security Architecture
- Bluetooth Pairing and Key Management
- Algorithms
- Broadcast Encryption
- Security Policies and Access Control
- Attacks, Strenghs, and Weaknesses
- Bluetooth Security Enhancements
- Providing Anonymity
- Key Management Extensions
- Security for Bluetooth Applications
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Artech House |
Auteur(s) | Christian Gehrmann, Joakim Persson, Ben Smeets |
Collection | Internet/Computer Security |
Parution | 22/11/2004 |
Nb. de pages | 204 |
Format | 15,5 x 23,5 |
Couverture | Relié |
Poids | 436g |
Intérieur | Noir et Blanc |
EAN13 | 9781580535045 |
ISBN13 | 978-1-58053-504-5 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet
- Informatique Réseaux et télecommunications Réseaux sans fil et télécommunications mobiles Bluetooth