To search, Click below search items.


All Published Papers Search Service


Open Services ? Need To Restrict Access in Bluetooth


Pushpa Suri, Sona Rani


Vol. 7  No. 5  pp. 190-192


Security is essential to many applications, which will use Bluetooth links, but hiding the complexity of Bluetooth security from the user is essential if Bluetooth devices are to be easy to use. Through the security architecture, it is possible to implement security at a variety of levels with minimal intervention from the user. The Security manager is the central entity that manages and enforces security policy in the Bluetooth Security Architecture. In this research paper we have proposed the solution for the escaping from the attack from the unknown devices by the use of security manager information. Our solution deals with the security-related information stored in the security manager about the unsuccessful connection request by the unknown device.


Bluetooth, security manager, trusted device, untrusted device