Open Services - Need To Restrict Access in Bluetooth

被引:0
作者
Suri, Pushpa [1 ]
Rani, Sona [1 ]
机构
[1] Kurukshetra Univ, Dept Comp Sci & Applicat, Kurukshetra, Haryana, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2007年 / 7卷 / 05期
关键词
Bluetooth; security manager; trusted device; untrusted device;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is essential to many applications, which will use Bluetooth links, but hiding the complexity of Bluetooth security from the user is essential if Bluetooth devices are to be easy to use. Through the security architecture, it is possible to implement security at a variety of levels with minimal intervention from the user. The Security manager is the central entity that manages and enforces security policy in the Bluetooth Security Architecture. In this research paper we have proposed the solution for the escaping from the attack from the unknown devices by the use of security manager information. Our solution deals with the security - related information stored in the security manager about the unsuccessful connection request by the unknown device.
引用
收藏
页码:190 / 192
页数:3
相关论文
共 3 条
[1]  
Bluetooth Special Interest Group, 2004, SPEC BLUET SYST COR
[2]  
Bluetooth Special Interest Group, 2003, SPEC BLUET SYST COR
[3]  
Jakobsson Markus, 2001, LECT NOTES COMPUTER