【正文】
畢 業(yè) (學位) 論 文 題 目: 藍牙技術安全性分析與安全策略 系 (部 )院: 計算機系 專 業(yè): 計算機科學與技術 摘 要 在藍牙網(wǎng)絡中,沒有固定的基礎組織,其拓撲結構隨時都有可能變化,所有的設備都通過無線方式連接,而且設備間的通信不一定是直接進行的,可能是由網(wǎng)絡中某個設備來轉達的,這個設備即在網(wǎng)絡中起著路由的作用。在這樣的網(wǎng)絡中,安全問題是相當復雜的,網(wǎng)絡特別容 易泄密和遭受攻擊。 本文通過對藍牙技術的介紹,主要針對藍牙技術安全性問題,分析了藍牙系統(tǒng)的安全需求和安全威脅,并對藍牙的安全機制的框架做了詳細介紹。提出了藍牙安全結構,針對藍牙系統(tǒng)安全的兩種主要模式即鏈路級安全模式和服務級安全模式,進行了重點分析。同時,藍牙技術的無線傳輸特性使它非常容易受到攻擊,藍牙技術特別設計了快速跳頻方案以確保鏈路穩(wěn)定,這樣增強了系統(tǒng)抗干擾性,并在一定程度上保證了系統(tǒng)的安全性。最后,提出了解決藍牙安全問題的安全策略。 關鍵詞: 藍牙;安全分析;安全策略;鑒權與加密;授權 Abstract In the bluetooth work, does not have the fixed foundation anization, its topology all has the possibility change as necessary, all equipment all through wireless way connection, moreover correspondence between the equipment not necessarily is carries on directly, possibly is, this equipment which some equipment conveys by the work in namely in the work is playing the route such work, the security problem is quite plex, the work is specially easy to divulge a secret and to suffer the attack. This article through to the blue tooth technology introduction, mainly aims at the blue tooth technology secure question, has analyzed the blue tooth system security requirements and the safe threat, and has made the detailed introduction to the blue tooth safety mechanism the blue tooth safety mechanism, in view of the blue tooth system safety two kind of main patterns is the link level safe mode and the service level safe mode, has carried on the key the same time, the blue tooth technology wireless transmission characteristic causes it extremely easily to e under the attack, the blue tooth technology designed the fastfrequency hopping plan to guarantee the link specially to be stable, like this strengthened the system antijamming, and has guaranteed the system security to a certain , proposed solves the blue tooth security problem security policy. Keywords: Bluetooth。 Safe analysis。 Security policy。 Warning power and encryption。 Authorization 目 錄 第一章 引 言 ............................................................................................................... 6 選題的意義 .................................................................................................... 6 選題的應用現(xiàn)狀 ............................................................................................ 6 選題主要工作內(nèi)容 ........................................................................................ 7 第二章 藍牙技術的安全問題 ................................................................................... 8 .................................. 8 ............................................................................................... 8 信息安全 ............................................................................................. 8 藍牙系統(tǒng)中的安全威脅 ................................................................................ 8 藍牙系統(tǒng)安全的任務 .................................................................................... 9 2. 藍牙系統(tǒng)的安全任務 ........................................................................ 9 第三章 藍牙安全機制的框架 ................................................................................. 10 ............................................................................................ 10 藍牙的安全設置 .......................................................................................... 12 藍牙的安全級別 .......................................................................................... 12 藍牙技術的安全機制 .................................................................................. 13 3. 設備鑒權 .......................................................................................... 13 ..................................................................................................... 13 快跳頻 ............................................................................................... 13 第四章 藍牙安全威脅分析 ....................................................................................... 14 ............................................................................................ 14 ............................................................................ 14 PIN機制有缺陷 ............................................................................................. 15 ............................................................................................ 15