Chapter 14Security in Wireless Personal Area Networks

This chapter presents security techniques used in personal area networks. We will see how the ideas presented in Chaps. 12 and 13 are applied on the Bluetooth wireless personal area network (WPAN), specifically how data are protected via encryption, how authentication is performed (including key exchange), and what limitations and problems are present in the design.

14.1 Basic Idea

Wireless personal area networks (WPANs) provide connectivity between nodes that are relatively close, within 10 m. WPANs function as an alternative to a cable, e.g., linking a wireless headphone to a portable CD player. Bluetooth is an industry standard protocol for WPANs and is now developed as one of the IEEE ...

Get Fundamentals of Mobile and Pervasive Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.