Skip to Content
From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband
book

From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband

by Martin Sauter
March 2011
Intermediate to advanced
450 pages
18h 25m
English
Wiley
Content preview from From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband

7.5 Bluetooth Security

As Bluetooth radio waves do not stop at the doorstep, the Bluetooth standard specifies a number of security functions. All methods are optional and do not have to be used during connection establishment or for an established connection. The standard has been defined thus: some services do not require security functionality. Which services are implemented without security is left to the discretion of the device manufacturer. A mobile phone manufacturer, for example, can decide to allow incoming file transfers without a prior authentication of the remote device. The incoming file can be held in a temporary location and the user can then decide to either save the file in a permanent location or discard it. For services like dial-up data, such an approach is not advisable. Here, authentication should occur during every connection establishment attempt to prevent unknown devices from establishing an Internet connection without the user's knowledge.

Bluetooth uses the SAFER + (Secure and Fast Encryption Routine) security algorithms, which have been developed by ETH Zurich and are publicly available. So far, no methods have been found that compromise the encryption itself. However, there have been reports on device-specific Bluetooth security problems as, for example, discussed in [4] and general weaknesses have been found concerning the initial key negotiation. If an attacker is able to record the initial pairing process that is described below, he can calculate ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks

LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks

Abd-Elhamid M. Taha, Hossam S. Hassanein, Najah Abu Ali
4G: LTE/LTE-Advanced for Mobile Broadband, 2nd Edition

4G: LTE/LTE-Advanced for Mobile Broadband, 2nd Edition

Erik Dahlman, Stefan Parkvall, Johan Skold

Publisher Resources

ISBN: 9780470978221Purchase book