Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Bluetooth Security.pdf
Скачиваний:
105
Добавлен:
17.08.2013
Размер:
1.57 Mб
Скачать

42

Bluetooth Security

channel or connection request. Thus it is possible to allow access to some services without any authentication or encryption and a unit can be totally open to some services while still restricting access to other services.

2.5.2Security policy management

If security mode 2 is required together with a high security level, an advanced security policy must be implemented. One possibility is to use a security manager that handles the security policy and enforces the security mechanism. An example of how a security manager can be implemented in Bluetooth is given in [5]. According to these recommendations, the security manager is the responsible entity for security enforcement and it interacts with several different layers in the stack (see Section 1.1.3). In this architecture, an application or set of applications (referred to as service) register their security demands with the security manager. The security requirements of all supported applications make up the security policy. The security manager handles the policy. Since link-level security in Bluetooth is connected with the device address (through the link keys), the security manager needs access to a database, which contains information on different Bluetooth units, the corresponding link keys, and their level of trust. In addition to this, the manager needs access to a service database, which contains the specific security requirements of a particular service.

In Chapter 6 we describe how security policies can be managed in Bluetooth. We discuss different implementation alternatives and we also give a more detailed description of the recommendations given in [5].

References

[1]Dierks, T., and C. Allen, The TLS Protocol, Version 1.0, RFC 2246, January 1999.

[2]Harkins, D., and D. Carrel, The Internet Key Exchange (IKE), RFC 2409, November 1998.

[3]Massey, J. L., and R. A. Rueppel, “Method of, and Apparatus for, Transforming a Digital Sequence into an Encoded Form,” U.S. Patent No. 4,797,922, 1989.

[4]Bluetooth Special Interest Group, Specification of the Bluetooth System, Version 1.1, Profiles, Part K:1 Generic Access Profile, February 2001.

[5]Müller, T., ed., “Bluetooth Security Architecture,” White Paper Revision 1.0, Bluetooth Special Interest Group, July 1999.