Connecting & Addressing Security Concerns of Bluetooth Technology in Current Scenario
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2016, Vol 3, Issue 1
Abstract
In this paper we present a survey on Bluetooth technology regarding the threats and vulnerability attacks during data transfer on its security mechanism. Bluetooth technology uses the personal area network (PAN). It is the kind of wireless Ad-hoc network. Low cost, low power, low complexity and robustness are the basic features of Bluetooth. It works on Radio frequency. Bluetooth Technology has many benefits like replacement of cable, easy file sharing, wireless synchronization and internet connectivity. As Bluetooth Technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. Security in Bluetooth communication has been an active area of research for last few years. The article presents various security threats and vulnerability attacks on Bluetooth technology and also how to restrict them.
Authors and Affiliations
Rajnish Mehra
Different Facial Expression Recognition and Face Detection Technique
Face detection is a computer technology that determines the locations and sizes of human faces in arbitrary (digital) images. After detection of face in a picture, it can be compared with the ones present in the database...
Comparative Studies on Techniques for Transportation Problem of Initial Basic Feasible Solution (IBFS)
Transportation model is a special class of linear programming problem in which the objective is to transport or distribute a single commodity or goods from various sources/origins to different destination a...
Control Model for Analyzing Erroneous Human Behavior a System Safety Using Model Checker with Mutation Testing Approach
Safety critical system always provides the automatic system machine where automation testing become an important part for safety. Automation testing is one way to change the way to operate Safety critical system. This is...
A Hybrid PAPR Reduction Scheme Using Selective Mapping and Amplitude Clipping
High information rate is the major requirement of modern communication systems. As there is the scarcity of spectrum OFDM proves itself very useful. In OFDM the subcarriers are made adjacent and orthogonal to each other...
A Novel Approach for Appraising the Performance of Multimedia Traffic for OLSR Routing Protocol in Manet
Mobile Ad-hoc Network is a set of portable electronic receivers which detects and demodulates and amplifies transmitted signals. MANETs do not have any polarized armature. Immense excerpt of influx on the cyberspace tran...