Bluetooth Security-Secure Data Transfer over Bluetooth

Date Added: Aug 2011
Format: PDF

This paper describes the mechanism of Bluetooth authentication. In Bluetooth when two units want to communicate they need to be paired to each other. In the pairing process units are exchanging keys and authenticate each other. In this paper, the authors used RSA algorithm by which two units are paired with secure way. When Bluetooth devices come within range of another, an electronic conversation takes place to determine whether the devices in range are known or whether one needs to control the other. Most Bluetooth devices do not require any form of user interaction for this to occur. If devices within range are known to one another, the devices automatically form a network - known as a pairing.