2012 International Conference on Computing, Communication and Applications 2012
DOI: 10.1109/iccca.2012.6179149
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Bluetooth threats and v4.0 security features

Abstract: The advent of Bluetooth technology has made wireless communication easier. Any new invention or improvement is viewed very closely by people who are looking to gain information in an unauthorized manner. Security in any area is given more importance as it leads to better product and satisfied customers. The initial days of any technological invention is more challenging as they deal with new issues every day. The product/ invention needs to keep evolving to address the growing list of new features requirement … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
12
0
2

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 13 publications
0
12
0
2
Order By: Relevance
“…In [34], techniques were presented for eavesdropping on devices using Bluetooth. An extended review of Bluetooth threats and possible attacks was performed by Minar et al , Sandya et al and Dunnin [10,22,35], and recently, Cope et al [9] investigated the currently available tools to exploit vulnerabilities in Bluetooth. In conclusion, many Bluetooth versions that are in use today, have a wide variety of security vulnerabilities.…”
Section: Short Range Communication Protocolsmentioning
confidence: 99%
“…In [34], techniques were presented for eavesdropping on devices using Bluetooth. An extended review of Bluetooth threats and possible attacks was performed by Minar et al , Sandya et al and Dunnin [10,22,35], and recently, Cope et al [9] investigated the currently available tools to exploit vulnerabilities in Bluetooth. In conclusion, many Bluetooth versions that are in use today, have a wide variety of security vulnerabilities.…”
Section: Short Range Communication Protocolsmentioning
confidence: 99%
“…Bluetooth specification defines several security mechanisms for authentication and link layer security, but it is often seen that developers ignore these security measures to trade for design simplicity and to obtain fast market access. There is some well-documented case of attacks on BLE devices that comprise of intervening BLE connections, stealing private information [7]- [9] and jamming [10]. These active attacks, although detrimental, can be easily detected by intrusion detection systems [11], [12].…”
Section: Introductionmentioning
confidence: 99%
“…There are four modes of protection (Security mode 1, Security mode 2, Security mode 3 and Security mode 4). Mode 1 does not require authentication and encryption, mode 2 applies authentication and encryption exclusively for individual services such as data transfer, mode 3 forces authentication, and encryption before the connection with the device is established, and mode 4 uses a simple method of pairing with the aim of establishing security on the service level [22].…”
Section: Security Aspect Of the Bluetooth Technologymentioning
confidence: 99%