BLUETOOTH SECURITY THREATS
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 2
Abstract
Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. The proliferation of the Bluetooth devices in the workplace exposes organizations to security risks. Bluetooth technology and associated devices are susceptible to general wireless networking threats, such as denial of service attack, eavesdropping, man-in-the-middle attacks, message modification, and resource misappropriation. Preventing unauthorized users from secure communication is a challenge to the pairing process.
Authors and Affiliations
Praveen Kumar Mishra
Reinforcement Learning based Routing Protocols in WSNs: A Survey
Advances in the technology along with reduction in processor size, its memory, and wireless antenna size has facilitated the construction of low cost, low powered and multifunctional Sensor nodes which in turn led to hig...
IMPLEMENTATION OF IMAGE PROCESSING ALGORITHMS ON THE PARALLEL PLATFORM USING MATLAB
Application with sequential algorithm can no longer rely on technology scaling to improve performance. Image processing applications exhibits high degree of parallelism and are excellent source for multicore platform. Ma...
Map Overlay and Zooming for Satellite Images
Map overlay and satellite image zooming makes map reading more convenient. These techniques are the building block for various analysis operations in GIS. Map overlay is performed by layering maps in the form of shapefil...
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET
In Mobile Ad-Hoc Networks (MANETs), mobile devices are operational with power. In order to utilize these energy operational devices resourcefully for transmission of data packets, many energy aware routing strategies are...
A Study on signcryption Scheme Based on Eliptic Curve
Data exchange is more essential to share information in the age of information technology to achieve the different tasks. As the transmission media is unreliable it need protection of that data moves in an unsecure commu...