BLUEBORNE VULNERABILITIES IN BLUETOOTH IMPLEMENTATIONS IN DIFFERENT OPERATION SYSTEMS

Abstract

Ubiquitous adaptation of protocols and technologies for implementations of old solutions in new platform make it more unsecured. That leads to constant change and adaptation. Many solutions aren’t revised and insufficiently tested, which is connected to spectrum of systems and devices. It isn’t surprising that one of the main and most popular technology stacks - Bluetooth have serious vulnerabilities.

Authors and Affiliations

Konstiantyn Tykhonov

Keywords

Related Articles

CLASSIFICATION OF PATIENTS WITH CORONARY HEART DISEASE WITH DIABETES AT DIAGNOSIS OF POSTOPERATIVE COMPLICATIONS

The risk factors for the development of arrhythmias in patients with ischemic heart disease with simultaneous diabetes in the early postoperative period were found by the method of the tree classifications, for the addic...

THE PRINCIPLES OF HIGH LOAD WEB-SYSTEMS DEVELOPMENT

The overview of problem in high load web-systems development is fulfilled and appropriate architectural solutions are offered.

INFLUENCE OF GAS PIPELINE LOADING ON CHOICE OF OPTIMIZATION CRITERIA

The significant work of the gas transportation system is significantly affected by the significant wear of the gas transmission equipment used. Positive results can be achieved primarily by optimizing the operation of th...

CALCULATED PARAMETERS OF WIND POWER ENGINEERING UNITS WHICH WORK AT MILLED WIND SPEEDS

The optimization procedure of wind turbinesdesign parameters aimed at adaptation them of meteorological condition of Ukraine is considered. If is shown that increasing of energy output be obtained by the proper selection...

DEVELOPMENT OF METHODS OF MANAGEMENT IN AN ENTERPRISE JAVA APPLICATION

The purpose of writing this article was to compare several methods of development and access management in an enterprise Java application. There was a problem with the use of a particular method depending on the needs of...

Download PDF file
  • EP ID EP610336
  • DOI -
  • Views 72
  • Downloads 0

How To Cite

Konstiantyn Tykhonov (2018). BLUEBORNE VULNERABILITIES IN BLUETOOTH IMPLEMENTATIONS IN DIFFERENT OPERATION SYSTEMS. Международный научный журнал "Интернаука", 1(13), 36-38. https://europub.co.uk/articles/-A-610336