2012
DOI: 10.5120/8003-1308
|View full text |Cite
|
Sign up to set email alerts
|

Security Risks in Bluetooth Devices

Abstract: The Bluetooth is widely used to link cell phones to their accessories, and its security has not been considered a major problem. This research paper describes the critical problems and the risks that are identified in all Bluetooth-enabled kits that are tested. Also this paper will explain what Bluetooth is, how it works, and some of the vulnerabilities and risks associated with it.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Table A1 in the Appendix A describes the vulnerabilities and security flaws of Bluetooth devices for different versions [ 18 ]. Few of the known vulnerabilities have been identified by researchers, such as MITM, Bluesmack, battery drain attacks, and backdoor attacks [ 19 ]. Recently, researchers identified the “SweynTooth” vulnerability affecting implantable medical devices (e.g., insulin pumps, pacemakers, and blood glucose monitors) and hospital equipment (e.g., patient monitors and ultrasound machines) that work on BLE [ 20 ].…”
Section: Related Workmentioning
confidence: 99%
“…Table A1 in the Appendix A describes the vulnerabilities and security flaws of Bluetooth devices for different versions [ 18 ]. Few of the known vulnerabilities have been identified by researchers, such as MITM, Bluesmack, battery drain attacks, and backdoor attacks [ 19 ]. Recently, researchers identified the “SweynTooth” vulnerability affecting implantable medical devices (e.g., insulin pumps, pacemakers, and blood glucose monitors) and hospital equipment (e.g., patient monitors and ultrasound machines) that work on BLE [ 20 ].…”
Section: Related Workmentioning
confidence: 99%
“…In this way, unless the owner is actually observing their devices at the precise moment a connection is established, they are unlikely to notice anything unusual, and the attacker may be free to continue to use any resource that a trusted relationship with that device grants access to. This means that not only can data be retrieved from the phone, but other services, such as modems, or Internet, Wireless Application Protocol (WAP) and General Packet Radio Service (GPRS) gateways could be used [37].…”
Section: Backdoor Attackmentioning
confidence: 99%