Security Solutions India


Access Control & Security Systems Online Directory



Browse the subcategories
Wireless Security
Bluetooth Security
Protecting Bluetooth devices
Bluetooth FAQs


5 latest products

HP iPAQ rx3715 Mobile Media Companion




Parrot CK 3100


Bluetooth Audio Player OBH-0100


Nokia 6600

Featured Product

Apple wireless keyboard and Mouse


Sony Ericsson Headset HBH-660



Complete software solutions for  payroll software  for offices, guarding companies, outsourcing companies, exporters, schools... medical softwares like audio vestibular data management system, gynaecological software


You are here: Home >>Mobile Security Systems >> Wireless Security

Wireless Security 


Today's wireless world means that data is being sent, among us, invisibly from device to device, country to country, person to person. This data, in the form of e-mails, photos, contacts and addresses are precious and private to each of us. This private information, no longer making its way along wires in plain sight, needs to be sent securely to its intended recipient without interception. Wireless standards the world over are evolving and have various formats for dealing with the security issues of its users. Bluetooth wireless technology is no exception.



Bluetooth wireless technology has, from its inception, put great emphasis on wireless security so that users of this global standard can feel secure while making their connections. The Bluetooth Special Interest Group (SIG), made up of over 3000 member manufacturers, has a Bluetooth Security Experts Group made up of engineers from its member companies, which provide critical security information and feedback that is taken into account as the Bluetooth wireless specification evolves.

Product developers that use Bluetooth wireless technology in their products have several options for implementing security. There are three modes of security for Bluetooth access between two devices.
  • Security Mode 1: non-secure
  • Security Mode 2: service level enforced security
  • Security Mode 3: link level enforced security

Dealing with mobile security threats

The manufacturer of each product determines these security modes. Devices and services also have different security levels. For devices, there are 2 levels, "trusted device" and "untrusted device". A trusted device, having been paired with one’s other device, has unrestricted access to all services. With regard to services, three security levels are defined: services that require authorization and authentication, services that require authentication only and services that are open to all devices.
Lately, confusion and misinformation surrounding security and Bluetooth wireless technology has increased. The current security issues typically involve mobile phones. How these issues apply to other classes of devices is important and is often not addressed. The encryption algorithm in the Bluetooth specifications is secure. As such, once paired, the communication between Bluetooth devices is also secure. This includes devices such as mice and keyboards connecting to a PC, a mobile phone synchronizing with a PC, and a PDA using a mobile phone as a modem to name just a few of the many use cases.
Cases where data has been compromised on mobile phones are the result of implementation issues on that platform. The Bluetooth SIG diligently works with our members to investigate any issues that are reported to understand the root cause of the issue. If it is a specification issue, we work with the membership to address that issue in the specification. If it is an implementation issue, we work with the membership to get patches out and ensure future devices don’t suffer from the same vulnerability. This is an on-going process. The recently reported issues of advanced "hackers" gaining access to information stored on select mobile phones using Bluetooth functionality are due to incorrect implementation. The names bluesnarfing and bluebugging have been given to these methods of illegal and improper access to information. The questions and answers below provide users with more information about these current issues and will address their concerns for dealing with these security risks.

Related Terms

Browse Categories

Computer And Information Security
CCTV, Surveillance Systems, Equipment & Components
Access Control Components, Equipment And Systems
Alarms, Burglar, Electronic Systems, Equipment & Components
Fire Protection, Detection & Controls
Intrusion Detection
Perimeter Security, Fences, Ballistic
Security & Specialty Services
Security Design Services
Facilities Systems

Find Products for :-


Find Solutions for:-
Complete information on security services, guarding services, investigators, detectives and security systems. We also have a online directory guide of the companies providing services the above services in different states of India like Delhi, Mumbai, Gurgaon, Banglore, Noida etc.


A Directory on Insurance as well as Insurance related topics updated to the latest. A total solutions site for your basic to advanced Insurance needs


Want a loan? Learn the pros and cons for taking a loan and lots of information for your finance problems.


Plan a trip to India! Visit the beautiful, culture rich country having diverse climates, castes, languages and creed. Each visit will add a new experience in your life, select your tour and make a trip to India with us



  © Copyright 2005. securitysolutionsindia. All Rights Reserved.