Publication detail

On Security of PAN Wireless Systems

FIEDLER, P. KUČERA, P. BRADÁČ, Z. HYNČICA, O. KACZ, P. VRBA, R.

Original Title

On Security of PAN Wireless Systems

English Title

On Security of PAN Wireless Systems

Type

journal article in Web of Science

Language

en

Original Abstract

This paper describes security features of ZigBee and Bluetooth PAN wireless networks. On examples of those two wireless systems are demonstrated challenges associated with utilization of present wireless systems for applications requiring secure data exchange. Recent penetration of wireless technologies into building and process automation applications even increases the need to fully understand the limitations of the security concepts used.

English abstract

This paper describes security features of ZigBee and Bluetooth PAN wireless networks. On examples of those two wireless systems are demonstrated challenges associated with utilization of present wireless systems for applications requiring secure data exchange. Recent penetration of wireless technologies into building and process automation applications even increases the need to fully understand the limitations of the security concepts used.

Keywords

wireless, PAN, security, ZigBee, Bluetooth

RIV year

2006

Released

18.07.2006

Publisher

Springer Berlin / Heidelberg

Location

Berlin / Heidelberg, SRN

Pages from

178

Pages to

185

Pages count

8

URL

BibTex


@article{BUT49452,
  author="Petr {Fiedler} and Pavel {Kučera} and Zdeněk {Bradáč} and Ondřej {Hynčica} and Peter {Kacz} and Radimír {Vrba}",
  title="On Security of PAN Wireless Systems",
  annote="This paper describes security features of ZigBee and Bluetooth PAN
wireless networks. On examples of those two wireless systems are demonstrated
challenges associated with utilization of present wireless systems for
applications requiring secure data exchange. Recent penetration of wireless
technologies into building and process automation applications even increases
the need to fully understand the limitations of the security concepts used.",
  address="Springer Berlin / Heidelberg",
  chapter="49452",
  institution="Springer Berlin / Heidelberg",
  journal="Lecture Notes in Computer Science (IF 0,513)",
  number="4017",
  volume="2006",
  year="2006",
  month="july",
  pages="178",
  publisher="Springer Berlin / Heidelberg",
  type="journal article in Web of Science"
}