Show simple item record

dc.contributor.authorWaleed, Ghossoon M.
dc.contributor.authorM. Faizal
dc.contributor.authorR. Badlishah, Ahmad, Prof. Madya Dr.
dc.contributor.authorMohd Fareq, Abd Malek
dc.contributor.authorM. Alif, Ghani
dc.date.accessioned2010-08-16T03:18:11Z
dc.date.available2010-08-16T03:18:11Z
dc.date.issued2009
dc.identifier.citationJournal of Computer Science, vol. 5(9), 2009, pages 646-650en_US
dc.identifier.issn1549-3636
dc.identifier.urihttp://www.thescipub.com/abstract/?doi=jcssp.2009.646.650
dc.identifier.urihttp://dspace.unimap.edu.my/123456789/8685
dc.descriptionLink to publisher's homepage at http://www.thescipub.com/en_US
dc.description.abstractProblem statement: Bluetooth has emerged as very popular ad hoc network standard today. Bluetooth network applications include wireless synchronization, e-mail/internet/intranet access using local personal computer connections, hidden computing through automated applications and networking. Due to this ability, it is not impossible for the network to receive any attack. Approach: In this study, we developed an algorithm to build new software that secures connections between two Bluetooth platforms, which included authentication, authorization and confidentiality. There is no authentication when using the protocol in connecting the Bluetooth platform. When there is no security, so that all users can directly connect to the server without any permission because in most of the application nowadays that refers to RFCOMM protocol is not. Results: The test environment for the non-secure connections is also being setting up before build the software. The purpose of this study was to build a secured Bluetooth application in connecting Bluetooth Platform using Radio Frequency Communication (RFCOMM) protocol. Conclusion: Furthermore focusing on setting up the test environment for a non-secure connection application.en_US
dc.language.isoenen_US
dc.publisherScience Publicationsen_US
dc.subjectCellular digital packet dataen_US
dc.subjectRadio frequency communicationen_US
dc.subjectSecurity modeen_US
dc.subjectBluetooth wireless networken_US
dc.subjectMobile communicationsen_US
dc.titleBluetooth wireless network authentication using radio frequency communication protocolen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record