【24h】

Bluetooth Security in Wearable Computing Applications

机译:穿戴式计算应用中的蓝牙安全性

获取原文

摘要

Advances in wireless sensor networking technologies have been extended to wearable computing systems and opened a plethora of applications and opportunities in the development and integration of pervasive Bluetooth Technologies with the abundance of existing specialized technologies in monitoring, data collection, and real-time analysis and reporting. Although the Bluetooth framework is acceptably secure, there are still a number of weaknesses in the Bluetooth technology. The nature of the wireless ad hoc and the device addressing schemes still make the Bluetooth protocol vulnerable to possible attacks and risks. This paper analyzes some of the vulnerabilities of Bluetooth architecture to possible attacks and risks and the best practices and countermeasures needed to thwart these attacks that target Bluetooth devices and their attached networks. It concentrates on Bluetooth technology security issues and challenges that face wireless computing systems.
机译:无线传感器网络技术的进步已扩展到可穿戴计算系统,并在无处不在的蓝牙技术的开发和集成中提供了大量的应用程序和机会,同时在监控,数据收集以及实时分析和报告方面还存在大量现有的专门技术。 。尽管蓝牙框架是可以接受的安全性,但是蓝牙技术仍然存在许多缺陷。无线自组织网络的性质和设备寻址方案仍然使蓝牙协议容易受到可能的攻击和风险。本文分析了蓝牙体系结构可能遭受的攻击和风险的一些脆弱性,以及阻止这些针对蓝牙设备及其连接网络的攻击所需的最佳实践和对策。它专注于无线计算系统面临的蓝牙技术安全问题和挑战。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号