174 Smart Phone and Next-Generation Mobile Computing
Bluetooth security has been criticized to some extent due to the
user’s lack of total control over wireless connections and data trans-
mission. Bluetooth provides link-level authentication and encryp-
tion using unit address, a secret authentication key, a secret privacy
key, and a random number. A number of concerns have been
raised over Bluetooth security mechanisms as a result of a few
proof-of-concept attacks on communication and user data, such as
Bluesnarfing and Bluejacking. This topic is discussed in more detail
in Chapter 6.
3.12 Ultra-Wideband
Ultra-wideband (UWB) is a disruptive short-range radio frequency
wireless technology that could provide a potential solution to many
problems in the ...