The security analysis and improvements of link connection mechanism for mobile phone bluetooth transmission

Rui Zhang; Jian Wei Wang; Yaobin Xie; Lizhong Wang
June 2014
Journal of Chemical & Pharmaceutical Research;2014, Vol. 6 Issue 6, p1380
Academic Journal
The development of mobile communication technology has become a dazzling star in the information field. Especially for the third-generation mobile communication, Mobile phone Bluetooth is a highly-anticipated technology, with wide application prospects and potential economic value. Bluetooth mobile phone is incredibly good at connecting wirelessly to other terminal equipments and transferring data between devices very near each other. Meanwhile, the security of mobile phone Bluetooth transmission becomes the concern of the current users, and ensuring the security of Mobile phone Bluetooth transmission is also a problem to be solved urgently. In this paper, the file transport mechanism of Mobile phone Bluetooth is the main research object. Based on link protocol, using the security analysis of link connection mechanism, this paper improved the Personal Identification Number (PIN) input from the user interface, in order to enhancing the security of link connection mechanism of the underlying file transfer protocol.


Related Articles

  • Cellphone THEFT. BROWN, RACHEL // Rural Telecom;Mar/Apr2013, Vol. 32 Issue 2, p19 

    The article focuses on cellphone theft in the U.S. Topics discussed include the creation of a nationwide database to prevent reactivation of stolen phones, educating consumers to report lost or stolen phones and theft in rural tourism areas. Some of the security measures customers are encouraged...

  • NEW SECURITY THREATS TARGET CELL PHONES, MOBILE DEVICES. Villano, Matt; Follett, Jennifer Hagendorf // CRN;3/21/2005, Issue 1138, p45 

    Addresses the emergence of security threats targeting cellular phones as of March 2005. Information on the Cabir virus that originated from the Philippines; Reason for considering the BlackBerry product from Research In Motion as a potential risk for customers; Methods that increase the risks...

  • Mobile VAS--from fantasy to reality. Chanay, Xavier // Telecommunications - International Edition;Feb2001, Vol. 35 Issue 2, p102 

    Discusses wireless telecommunication operators' ability to have value added service (VAS) interoperability by using security identity module (SIM) toolkit and javacard. Shortening of marketing time; Reduction of cost and risk; Impact of javacard technology on the SIM card market; Ramifications...

  • Mobile Security--A Work In Progress. Finneran, Michael // Business Communications Review;Nov2006, Vol. 36 Issue 11, p18 

    The article discusses the challenges of wireless phone security. As technology increases, maintaining secure wireless devices is becoming increasingly complex. The four aspects of mobile security--privacy, authentication, veracity and network/device availability--are related. The unique...

  • Mobile Security: A Market Set to Soar. Hulme, George // CRN;Mar2009 Channel Advisor, p10 

    The article focuses on the importance of security protection for smartphones and mobile storage media in the U.S. The threats to confidential information stored on mobile devices are increasing and assures that the probability that hackers will start crafting it is also high. In response,...

  • Enterprises will soon become the key drivers of the mobile phone security market, analysts believe.  // SC Magazine: For IT Security Professionals (UK Edition);Jan2007, p8 

    The article considers the possible role of business enterprises as the key drivers of the mobile phone security market. According to Alan Goode, senior analyst at Juniper Research, corporate information technology managers are getting very concerned about the use of mobile devices on corporate...

  • Smartphones are great tools, but at what risk? Tullett, Jon // SC Magazine: For IT Security Professionals (UK Edition);Jul2004, p9 

    This article focuses on the risk of using smartphones. Mobile phones are allegedly evolving into smartphones. For one, Sony has taken the step of backing out of the personal digital assistant market, choosing instead to back its Sony-Ericsson smartphone line. Manufacturers are cramming new...

  • Caught in the web. Birchall, Amy // Management Today (14405636);Jul2014, p34 

    The article discusses how businesses can protect their data in the face of increasingly complex threats to mobile security in the 21st century. Topics include comments from technical director at cyber security solutions firm Sourcefire, Dean Frye, on the most common type of security breach,...

  • Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors. Jackson, Jennifer T.; Creese, Sadie // IEEE Transactions on Dependable & Secure Computing;Dec2012, Vol. 9 Issue 6, p930 

    The growth in the use of Smartphones and other mobile computing devices continues to grow rapidly. As mobile wireless communications become ubiquitous, the networks and systems that depend upon them will become more complex. In parallel with this, the spread of digital viruses and malicious...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics