{"title":"基于每个分类组内风险分析的蓝牙自组织网络进一步分类","authors":"Keijo Haataja","doi":"10.1109/ICN.2008.26","DOIUrl":null,"url":null,"abstract":"Since ad-hoc networks have no fixed infrastructure, there are many different kinds of Bluetooth-enabled ad- hoc networks with various security procedures and security requirements. In this paper, we make further classification of Bluetooth-enabled ad-hoc networks and their security procedures/requirements depending on a risk analysis within each classified group. In addition, we evaluate possible breaches and damage that can be inflicted by various attacks in such scenarios. Moreover, we devise security procedures to prevent malicious Bluetooth devices from stealing information from other Bluetooth devices.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Further Classification of Bluetooth-Enabled Ad-Hoc Networks Depending on a Risk Analysis within Each Classified Group\",\"authors\":\"Keijo Haataja\",\"doi\":\"10.1109/ICN.2008.26\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since ad-hoc networks have no fixed infrastructure, there are many different kinds of Bluetooth-enabled ad- hoc networks with various security procedures and security requirements. In this paper, we make further classification of Bluetooth-enabled ad-hoc networks and their security procedures/requirements depending on a risk analysis within each classified group. In addition, we evaluate possible breaches and damage that can be inflicted by various attacks in such scenarios. Moreover, we devise security procedures to prevent malicious Bluetooth devices from stealing information from other Bluetooth devices.\",\"PeriodicalId\":250085,\"journal\":{\"name\":\"Seventh International Conference on Networking (icn 2008)\",\"volume\":\"66 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Seventh International Conference on Networking (icn 2008)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICN.2008.26\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Seventh International Conference on Networking (icn 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICN.2008.26","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Further Classification of Bluetooth-Enabled Ad-Hoc Networks Depending on a Risk Analysis within Each Classified Group
Since ad-hoc networks have no fixed infrastructure, there are many different kinds of Bluetooth-enabled ad- hoc networks with various security procedures and security requirements. In this paper, we make further classification of Bluetooth-enabled ad-hoc networks and their security procedures/requirements depending on a risk analysis within each classified group. In addition, we evaluate possible breaches and damage that can be inflicted by various attacks in such scenarios. Moreover, we devise security procedures to prevent malicious Bluetooth devices from stealing information from other Bluetooth devices.