期刊文献+

用NFC技术快速建立蓝牙安全连接问题研究 被引量:18

RESEARCH ON FAST ESTABLISHING BLUETOOTH SECURE CONNECTION WITH NFC TECHNOLOGY
下载PDF
导出
摘要 利用NFC技术交换数据安全性高、便捷、功耗低等特点,提出使用NFC为蓝牙建立连接的两种方案,把NFC与蓝牙传输结合起来,避免传统蓝牙传输连接过程搜索设备、配对等繁杂操作,同时保证数据传输安全性,解决了蓝牙传输连接过程复杂、设备功耗大、传输安全性较差等问题。根据其中一种方案设计并实现了"NFC+蓝牙"数据传输系统,测试性能良好,总体性能优于传统蓝牙传输方式,结果表明采用该方案用于移动设备间数据传输具有较高可用性。 Taking the advantage of NFC technology's features of highly safe,convenient and low power dissipated when exchanging data,we present two schemes of using NFC to establish the Bluetooth connection.They combine the transmission of NFC and of Bluetooth together so avoid complex operations the traditional Bluetooth transmission process do in devices searching,matching and so on,and meanwhile ensure the security of data transmission.This has solved the problems of Bluetooth transmission including being complicated in connection process,high power dissipation and poor security,etc.The "NFC + Bluetooth" data transmission system is designed and implemented according to one of the schemes,it has good test performance,its overall performance is superior to traditional Bluetooth transmission.The results show that to apply this scheme in data transmission between mobile devices has high availability.
作者 马捷 鄂金龙
出处 《计算机应用与软件》 CSCD 北大核心 2013年第3期207-212,224,共7页 Computer Applications and Software
关键词 近场通信 蓝牙 安全性 Near field communication(NFC) Bluetooth Security
  • 相关文献

参考文献11

  • 1Bluetooth Special Interest Group. IEEE 802.15.1 Specification of the Bluetooth System Profile v2.1 + EDR[ S]. 2007.
  • 2Stallings W. Network Security Essentials: Application and Standards(网络安全基础:应用与标准)[M].4版.北京:清华大学出版社,2010:9-12.
  • 3杨红丽,郑之光.蓝牙加密算法及其仿真[J].电子技术(上海),2003,30(2):22-24. 被引量:3
  • 4Muller NJ.Bluetooth Demystified(蓝牙揭秘)[M].北京:人民邮电出版社,2001:64-65,189.
  • 5Bluetooth Special Internet Group. Bluetooth Security Architecture vl. 0 [S]. 1999.
  • 6Ghanname T. How NFC can to speed Bluetooth transactions today [ J/ OL]. EEWimes, 2006. [2006. 2.14]. http://www, eetimes, corn/design/ comrnunications-design/4012606/How-NFC -can-to-speod-Bluetooth-trans- actions-151-today.
  • 7Shaked Y, Wool A. Cracking the Bluetooth PIN[ C]//Proceedings of 3rd USENIX/ACM Conference on Mobile Systems, Application and Service, 2005:39 -50.
  • 8谭凤林,葛临东.蓝牙安全机制分析[J].信息工程大学学报,2002,3(2):76-78. 被引量:9
  • 9ECMA-340. Near Field Communication Interface and Protocol (NF- CIP-1) 2nd Edition[ S]. 2004.
  • 10ECMA-352. Near Field Communication Interface and Protocol (NF- CIP-2) 1st Edition[S]. 2003.

二级参考文献5

  • 1Nathan J.Muller.Bluetooth Demystified[M].北京:人民邮电出版社,2001.8
  • 2Bluetooth Special internet Group. Bluetooth security architecture version 1.0[5 ], http://www. bluetooth. com/developer/specification/specification. asp, 1999
  • 3王国印等.Visual C++使用指南[M].北京:清华大学出版社,1997.6
  • 4刘汉华,吴锐,全景才.蓝牙安全机制[J].电子质量,2001(6):25-28. 被引量:5
  • 5王震,吴平,叶家骏.蓝牙技术的安全机制[J].电子技术(上海),2001,28(9):31-33. 被引量:2

共引文献10

同被引文献127

引证文献18

二级引证文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部