BLUETOOTH SECURITY THREATS

Abstract

Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. The proliferation of the Bluetooth devices in the workplace exposes organizations to security risks. Bluetooth technology and associated devices are susceptible to general wireless networking threats, such as denial of service attack, eavesdropping, man-in-the-middle attacks, message modification, and resource misappropriation. Preventing unauthorized users from secure communication is a challenge to the pairing process.

Authors and Affiliations

Praveen Kumar Mishra

Keywords

Related Articles

Performance of I-LEACH Routing protocol for Wireless Sensor Networks

In wireless sensor networks, sensor node always have a limited power resource. The energy consumed by sensor nodes to transfer the data to its destination becomes critical issue in designing WSN routing protocols. In thi...

ENHANCING THE DATA SECURITY OF SIMPLE COLUMNAR TRANSPOSITION CIPHER BY CAESAR CIPHER AND RAIL FENCE CIPHER TECHNIQUE.

Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique ,Substitution technique. In recent year...

Genetic Programming and Artificial Neural Networks in a Chemical Process System

The main objective in this paper is to develop a mathematical model of the glucose to gluconic acid batch fermentation process utilizing novel techniques such as Genetic Programming and Artificial Neural Networks. Downlo...

STOCHASTIC PERFORMANCE MODELING OF MANETS IMPLEMENTING AODV UNDER HIDDEN-EXPOSED TERMINAL PROBLEM

A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure. MANETs catch the great attention of researchers because of its unique...

A Study for Finding Location of Nodes in Wireless Sensor Networks

The popularity of Wireless Sensor Network (WSN) has increased tremendously in recent times. WSN has the potential to connect the physical world with the virtual world by forming a network of sensor nodes. Sensor nodes tr...

Download PDF file
  • EP ID EP103884
  • DOI -
  • Views 81
  • Downloads 0

How To Cite

Praveen Kumar Mishra (2013). BLUETOOTH SECURITY THREATS. International Journal of Computer Science & Engineering Technology, 4(2), 147-151. https://europub.co.uk/articles/-A-103884