英文原文
Wireless Security
Richard Barber
Richard Barber, group technical advisor of Articon-Integralis looks, at the evolution of tele- and
munications systems and assesses the potential advantages for mobile security offered by
technologies like Bluetooth
Security
Today's wireless world means that data is being sent, among us, invisibly from device to device, country to country, person to person. This data, in the form of e-mails, photos, contacts and addresses are precious and private to each of us. This private information, no longer making its way along wires in plain sight, needs to be sent securely to its intended recipient without interception. Wireless standards the world over are evolving and have various formats for dealing with the security issues of its users. Bluetooth wireless technology is no exception.
Bluetooth wireless technology has, from its inception, put great emphasis on wireless security so that users of this global standard can feel secure while making their connections. The Bluetooth Special Interest Group (SIG), made up of over 4000 member manufacturers, has a Bluetooth security experts group made up of engineers from its panies who provide critical security information and feedback that is taken into account
as the Bluetooth wireless specification evolves.
Product developers that use Bluetooth wireless technology in their products have several options for implementing security. There are three modes of security for Bluetooth access
between two devices.
Security Mode 1: non-secure
Security Mode 2: service level enforced security
Security Mode 3: link level enforced security
The manufacturer of each product determines these security modes. Devices and services also have different security levels. For devices, there are two levels: "trusted device" and "untrusted device." A trusted device, having been paired with one's other device, has unrestricted access to all services. With regard to services, th
无线安全——通信类外文翻译、中英文翻译 来自淘豆网www.taodocs.com转载请标明出处.