Connecting & Addressing Security Concerns of Bluetooth Technology in Current Scenario
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2016, Vol 3, Issue 1
Abstract
In this paper we present a survey on Bluetooth technology regarding the threats and vulnerability attacks during data transfer on its security mechanism. Bluetooth technology uses the personal area network (PAN). It is the kind of wireless Ad-hoc network. Low cost, low power, low complexity and robustness are the basic features of Bluetooth. It works on Radio frequency. Bluetooth Technology has many benefits like replacement of cable, easy file sharing, wireless synchronization and internet connectivity. As Bluetooth Technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. Security in Bluetooth communication has been an active area of research for last few years. The article presents various security threats and vulnerability attacks on Bluetooth technology and also how to restrict them.
Authors and Affiliations
Rajnish Mehra
Removal of Impulse Noise in Image Using Reduced Simple Edge Preserving Denoising Technique
Images and videos are mostly depraved by salt and pepper noise during the process of signal accession and transmission. Removal of noise is one of the most important issue in image analysis and processing. Even though wh...
Electro Chemical Comparative Studies Of Ortho, Meta and Para Nitro Phenols
Nitro phenol exists in three isomeric forms namely ortho, meta and para nitro phenols. Their susceptibility for electrochemical oxidation was studies by cyclic voltammetric method and polarization studies. Plenty of chem...
Cytotoxic Effects of Raphanus Sativus Root Extract on Root Meristem of Allium Cepa
The cytotoxic effects of radish root were investigated on meristematic cells of A. cepa roots. Actively growing root tips of A. cepa were treated with five concentrations (100%, 75%, 50%, 25% and 10%) of the root extract...
Geospatial Assesment of Trends and Patterns of Terrorism in Nigeria from 2010 To 2015
Terrorism in Nigeria has cost the loss of lives of thousands of Nigerian Citizens in the last five years. The war on terrorism have resulted in the loss of lives of innocent citizens as well as military personnels, not t...
Leveraging Mobility in Resolving Customer Complaints Electronically
How businesses resolve customer complaining behaviour effectively has been considered a “defensive marketing” strategy or a “zero-defections” strategy, which diminishes customer dissatisfaction. Handling customer dissati...