BLUETOOTH SECURITY–SECURE DATA TRANSFER OVER BLUETOOTH
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2011, Vol 11, Issue 2
Abstract
This paper describes the mechanism of Bluetooth authentication. In Bluetooth When two units want to communicate they need to be paired to each other. In the pairing process units are exchanging keys and authenticate each other. In this paper we used RSA algorithm by which two units are paired with secure way.
Authors and Affiliations
Pradeep Vishwakarma , Professor Brajesh patel
CONCURRENT ENGINEERING FOR PROCESS IMPROVEMENT OF PRODUCT
Nowadays the competition among companies is so compelling that they should not only be on the top of technology in the area, but also run their business according to life-long models. The emphasis on the product post-sal...
SWOT Analysis of Foreign Direct Investment on Indian Retail Industry
The requirement of space is one of the biggest demands, so the real estate has also grown over the last years. In the years to come Indian economy will also see the real estate sector climbing the steps of organized reta...
A PATH SELECT ALGORITHM WITH ERROR CONTROL SCHEMES AND ENERGY EFFICIENT WIRELESS SENSOR NETWORKS
A wireless sensor network consists of a large number of sensor nodes that are spread densely to observe the phenomenon. The whole network lifetime relies on the lifetime of the each sensor node. If one node di...
IS BAILOUT AN ANSWER TO GLOBAL FINANCIAL CRISIS?
The financial system in the USA, identified as the largest economy in the world, with a strong and robust financial system, has been in the eye of a storm in the past two years and more so in the recent months. To contro...
BLUETOOTH SECURITY–SECURE DATA TRANSFER OVER BLUETOOTH
This paper describes the mechanism of Bluetooth authentication. In Bluetooth When two units want to communicate they need to be paired to each other. In the pairing process units are exchanging keys and authenticate each...