BLUETOOTH SECURITY THREATS

Abstract

Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. The proliferation of the Bluetooth devices in the workplace exposes organizations to security risks. Bluetooth technology and associated devices are susceptible to general wireless networking threats, such as denial of service attack, eavesdropping, man-in-the-middle attacks, message modification, and resource misappropriation. Preventing unauthorized users from secure communication is a challenge to the pairing process.

Authors and Affiliations

Praveen Kumar Mishra

Keywords

Related Articles

Vision Based Gesture Recognition for Alphabetical Hand Gestures Using the SVM Classifier

In this paper we discuss how a Gesture Recognition system for Alphabetical Hand Gestures is built. The main motive was to develop a system that can simplify the way humans interact with computers. The system is designed...

Discrete & Continuous Mouse Motion Using Vocal & Non Vocal Characteristics of Human Voice.

Mouse control today has become an important tool to interact with computers. It is quite easy for those who are physically fit and mentally sound, but for those who are suffering from physical disabilities, It is quite d...

Human-Computer Interaction: Preamble and Future in 2020.

The growth in Human-Computer Interaction (HCI) field has not only been in quality of interaction, it has also experienced different branching in its history. The intention behind writing this paper is to provide an overv...

A Novel Approach to Big Data Management

In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. The increase in the amount of data sources also increases the amount of the data acquired. The...

Dynamic Time Quantum in Shortest Job First Scheduling Algorithm (DTQSJF) for Unpredictable Burst Time of Processes

In multitasking and time sharing operating system the performance of the CPU depends on waiting time, response time, turnaround time, context switches from the process mainly depends on the scheduling algorithm. Shortest...

Download PDF file
  • EP ID EP103884
  • DOI -
  • Views 92
  • Downloads 0

How To Cite

Praveen Kumar Mishra (2013). BLUETOOTH SECURITY THREATS. International Journal of Computer Science & Engineering Technology, 4(2), 147-151. https://europub.co.uk/articles/-A-103884