blue tooth 1.1协议
Security Comparison: BluetoothTM Communications vs. 802.11 Thomas G. Xydis Ph.D. Simon Blake-Wilson Bluetooth Security Experts Group 11-10-2001 revised 2-1-2002 1.0 Introduction Several attacks on IEEE 802.11b have been described in the media [1]. It has been shown that the WEP security framework used in IEEE 802.11 is susceptible to both attacks on data content and user authentication. These exposures allow an attacker to both inappropriately intercept data and also gain access to a network by impersonating a valid user.
用户评论