Bluetooth Security-Secure Data Transfer over Bluetooth

This paper describes the mechanism of Bluetooth authentication. In Bluetooth when two units want to communicate they need to be paired to each other. In the pairing process units are exchanging keys and authenticate each other. In this paper, the authors used RSA algorithm by which two units are paired with secure way. When Bluetooth devices come within range of another, an electronic conversation takes place to determine whether the devices in range are known or whether one needs to control the other. Most Bluetooth devices do not require any form of user interaction for this to occur. If devices within range are known to one another, the devices automatically form a network - known as a pairing.

Provided by: International Journal of Computer Science and Management Studies Topic: Mobility Date Added: Aug 2011 Format: PDF

Find By Topic