BLUETOOTH SECURITY THREATS

Abstract

Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. The proliferation of the Bluetooth devices in the workplace exposes organizations to security risks. Bluetooth technology and associated devices are susceptible to general wireless networking threats, such as denial of service attack, eavesdropping, man-in-the-middle attacks, message modification, and resource misappropriation. Preventing unauthorized users from secure communication is a challenge to the pairing process.

Authors and Affiliations

Praveen Kumar Mishra

Keywords

Related Articles

Reinforcement Learning based Routing Protocols in WSNs: A Survey

Advances in the technology along with reduction in processor size, its memory, and wireless antenna size has facilitated the construction of low cost, low powered and multifunctional Sensor nodes which in turn led to hig...

IMPLEMENTATION OF IMAGE PROCESSING ALGORITHMS ON THE PARALLEL PLATFORM USING MATLAB

Application with sequential algorithm can no longer rely on technology scaling to improve performance. Image processing applications exhibits high degree of parallelism and are excellent source for multicore platform. Ma...

Map Overlay and Zooming for Satellite Images

Map overlay and satellite image zooming makes map reading more convenient. These techniques are the building block for various analysis operations in GIS. Map overlay is performed by layering maps in the form of shapefil...

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

In Mobile Ad-Hoc Networks (MANETs), mobile devices are operational with power. In order to utilize these energy operational devices resourcefully for transmission of data packets, many energy aware routing strategies are...

A Study on signcryption Scheme Based on Eliptic Curve

Data exchange is more essential to share information in the age of information technology to achieve the different tasks. As the transmission media is unreliable it need protection of that data moves in an unsecure commu...

Download PDF file
  • EP ID EP103884
  • DOI -
  • Views 96
  • Downloads 0

How To Cite

Praveen Kumar Mishra (2013). BLUETOOTH SECURITY THREATS. International Journal of Computer Science & Engineering Technology, 4(2), 147-151. https://europub.co.uk/articles/-A-103884