Contents: 1. Preface; 2. Introduction; 3. Overview of the bluetooth security architecture; 4. Bluetooth pairing and key management; 5. Algorithms; 6. Broadcast encryption; 7. Security policies and access control; 8. Attacks, strengths, and weaknesses; 9. Providing anonymity; 10. Key management extensions; 11. Security for bluetooth applications; 12. Glossary; 13. List of acronyms and abbreviations; 14. About the authors; 15. Index.
Wireless communication slowly is becoming reality. In a wireless world, a printer is installed automatically after it is turned on; keyboard and mouse cables no longer become hopelessly tangled; Palm Pilots and mobile telephones automatically synchronize and communicate. Providing this sort of seamless, wireless communication--at a low cost--is the goal of Bluetooth technology..