Analysis of Bluetooth protocol security

dc.contributor.authorBaumeister, Todd
dc.date.accessioned2011-05-10T16:29:05Z
dc.date.available2011-05-10T16:29:05Z
dc.date.issued2010-05
dc.description.abstractThis manuscript describes the analysis of the Bluetooth protocol for known and possible security flaws, and proposes possible solutions to resolve the flaws. The proposed solutions that this manuscript presents are targeted towards the application layer for two reasons. The first is that as of 2008 over two billion Bluetooth devices have been sold. This means that the Bluetooth protocol is already well used, and solutions that require modification of the protocol or hardware will only protect future Bluetooth devices. The second reason the proposed solutions are targeted at the application layer is that not all applications that use Bluetooth require the level of security that is expected in this manuscript. The manuscript also goes on to validate two of the proposed solutions using a proof-of-concept method and using a formal proof.en
dc.identifier.urihttp://digital.library.wisc.edu/1793/52476
dc.subjectComputer networks -- Security measures.en
dc.subjectBluetooth technology -- Security measures.en
dc.titleAnalysis of Bluetooth protocol securityen
dc.typeThesisen

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Todd Baumeister.pdf
Size:
571.84 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.03 KB
Format:
Item-specific license agreed upon to submission
Description: