Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Bluetooth Security.pdf
Скачиваний:
105
Добавлен:
17.08.2013
Размер:
1.57 Mб
Скачать

10

Security for Bluetooth Applications

So far we have described the basic Bluetooth security mechanisms and enhancements/extensions to these basic mechanisms. Exactly how one should use (or not use) Bluetooth security will depend on the application. Some applications are more security sensitive than others and might need special care in their security design. In this chapter we discuss how to use the different security mechanisms described for three different Bluetooth applications:

1.Headset;

2.Network access;

3.SIM access.

These applications do not at all cover all possible applications or profiles that are part of the Bluetooth specification. However, we think that the security problems one faces when implementing security for these applications are quite typical for most Bluetooth applications. When discussing how to provide security for the chosen set of applications, we show how one would benefit from using the enhancements described in Chapters 8 and 9, respectively. Hence, some of the implementation suggestions given in this chapter are not possible to realize using only the standard Bluetooth security mechanisms. The reason for including some enhancements in the description is to illustrate how one would benefit from the improvements.

The recommendations and analysis we provide for the headset and network access applications are partly covered in the Bluetooth security white paper [1] provided by the Bluetooth SIG. The network access security solution we show here is partly described in [2].

167