2012
DOI: 10.5121/ijdps.2012.3110
|View full text |Cite
|
Sign up to set email alerts
|

Bluetooth Security Threats And Solutions: A Survey

Abstract: Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user's personal information. The security issues of Bluetooth have been an active ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(22 citation statements)
references
References 5 publications
0
21
0
1
Order By: Relevance
“…As bluetooth has become widespread there are various vulnerabilities in the security protocols of bluetooth. It also mentions some tips to the end user so that they become more cautious about their private information [5]. Smart home domain is a new trendy way of home automation and energy conservation.…”
Section: Related Workmentioning
confidence: 99%
“…As bluetooth has become widespread there are various vulnerabilities in the security protocols of bluetooth. It also mentions some tips to the end user so that they become more cautious about their private information [5]. Smart home domain is a new trendy way of home automation and energy conservation.…”
Section: Related Workmentioning
confidence: 99%
“…For example, BlueSnarfing is described in literature as "the software tools required to steal information from Bluetooth enabled mobile phones (that) are widely available in the Web" [24], therefore an "equipment" node would be assigned a higher weight because it is easily achieved. Figure 2 is an example attack graph on the theoretical device.…”
Section: Figure 2 Attack Graphmentioning
confidence: 99%
“…The sensors communicate through a wireless signal to a cellular smart phone which runs an application that processes, analyzes, and stores the data. [24] Pairing Eavesdropping Pair as little as possible, Link encryption, Set device to lowest power The application allocates a specific amount of memory for data storage and uploads the data to cloud storage when needed. Doctors have access to the cloud storage for data analysis.…”
Section: Data and Modelmentioning
confidence: 99%
“…One of the steps taken by Bluetooth developers to improve the security surrounding Bluetooth connections is by including a process called pairing. The process of pairing refers to a trusted relationship between two devices which are formed by secret codes, also known as pins (Minar and Tarique, 2012). The purpose behind this process is to create a custom link key that will allow for secure communication between devices (Gehrmann and Nyber, 2001).…”
Section: Bluetooth Technologymentioning
confidence: 99%