Advertisement

Bluetooth Security

  • Bruce Hopkins
  • Ranjith Antony

Abstract

So far, we’ve discussed the benefits and the advantages of using Java and Bluetooth, but we haven’t addressed (in any detail) the security implications of using this technology. What prevents other people from using your Bluetooth devices? What prevents a hacker from intercepting your transmission if you’re transmitting sensitive information like financial, personal, or medical data? In this chapter, we’ll take a look at the security measures built into the Bluetooth specification and the JSR-82 API in order to make your wireless applications more secure. We’ll wrap things up with a demonstration of how to use the Mobiwave Bluetooth Protocol Analyzer in order to see “what’s in the air” when you’re transmitting data between Bluetooth devices.

Keywords

Security Measure Authentication Process Personal Identification Number Symmetrical Encryption Slave Device 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Apress 2003

Authors and Affiliations

  • Bruce Hopkins
  • Ranjith Antony

There are no affiliations available

Personalised recommendations