The Barnes & Noble Review
Bluetooth technology is blooming in a variety of older and newer species, wireless application-wise. However, security has been an issue, until now. The release of Artech's Bluetooth Security book by erudite authors Christian Gehrmann, Joakim Persson, and Ben Smeets brings a discussion of the security features front and center. These three experts in security architectures and security systems thoroughly explore both the strengths and weaknesses of the security features available.
The authors begin by providing an overview of the Bluetooth system and the whole Bluetooth security architecture. Then, they describe Bluetooth key management. Next, the authors give a detailed description of the algorithms and the design principles behind them. The broadcast function is then described in detail, followed by an examination of security policies and access control. Then, the authors describe the attacks on Bluetooth security and show how location tracking can be avoided by introducing an anonymity mode. Then, they suggest several key management improvements and extensions. Finally, the authors deal with a set of Bluetooth applications.
Bluetooth technology is way too useful to allow security issues to stand in the way of its full potential in wireless applications. The most useful discussion found herein promises the reader a greater comprehension of the available security features, and perhaps an "ah-hah" experience as the new comprehension spurs your ingenuity and imagination.
John R. Vacca
John R. Vacca, the former computer security official (CSO) for NASA's space station program (Freedom), has written nearly 40 books about advanced storage, computer security, and aerospace technology.