01-03-2012, 04:50 PM
BLUETOOTH SECURITY ppt
[attachment=17858]
INTRODUCTION
Bluetooth is a new technology named after the 10th century by Danish king Herald Bluetooth.
Bluetooth is develop to provide cable-free environment.
Security architecture.
BASIC DEFINITION
ENCRYPTION
Transfers data to other form, can’t understood without key.
AUTHENTICATION
The ensuring of the identity of another user.
AUTHORIZATION
Deciding, if a device is allowed to have access to a service.
SERVICE LEVEL SECURITY
This is an approach for a flexible security
architecture built on top of the link-level security features of Bluetooth
The key component in the architecture is a
security manager
Functions
APPLICATIONS
Wireless headsets for cell phones.
Wireless PC Mouse connection to the PC using Bluetooth.
Wireless printing between a PC.
Automated synchronization of Personal Digital Assistant (PDAs) and PCs using Bluetooth.
Ad hoc networking and file sharing between PCs, PDAs & laptops in a meeting.
CONCLUSION
Bluetooth's security seemed to be adequate small ad hoc networks.
Bluetooth secure for larger networks, money transfers and transferring other sensitive information.
Original design goal of cable replacement.
Bluetooth is more suitable to short-range.
Small-size wireless personal area networks.