This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and features of this standardOCOs latest core release. After categorizing all the security issues involved in ad hoc networking, this hands-on volume shows you how to design a highly secure Bluetooth system and implement security enhancements. The book also helps you fully understand the main security risks involved with introducing Bluetooth-based communications in your organization.qInitiate the setup of trusted relationships on device level; ac Query the user or an application for pass-keys when needed. ... A well-defined and consistent link level security policy is automatically available for all applications utilizing Bluetoothanbsp;...
|Author||:||Christian Gehrmann, Joakim Persson, Ben Smeets|
|Publisher||:||Artech House - 2004-01-01|