Call for Paper - May 2014 Edition
IJCA solicits original research papers for the May 2014 Edition. Last date of manuscript submission is April 21, 2014. Read More

Security Risks in Bluetooth Devices

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 51 - Number 1
Year of Publication: 2012
Authors:
Vinayak P. Musale
S. S. Apte
10.5120/8003-1308

Vinayak P Musale and S S Apte. Article: Security Risks in Bluetooth Devices. International Journal of Computer Applications 51(1):1-6, August 2012. Published by Foundation of Computer Science, New York, USA. BibTeX

@article{key:article,
	author = {Vinayak P. Musale and S. S. Apte},
	title = {Article: Security Risks in Bluetooth Devices},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {51},
	number = {1},
	pages = {1-6},
	month = {August},
	note = {Published by Foundation of Computer Science, New York, USA}
}

Abstract

The Bluetooth is widely used to link cell phones to their accessories, and its security has not been considered a major problem. This research paper describes the critical problems and the risks that are identified in all Bluetooth-enabled kits that are tested. Also this paper will explain what Bluetooth is, how it works, and some of the vulnerabilities and risks associated with it.

References

  • The Preliminary Study http://student. vub. ac. be/PreliminaryStudy. html
  • The Referenced White Paper https://www. bluetooth. org/foundry/sitecontent/document/security_whitepaper_v1
  • Bluetooth Special Interest Group, 2006, http://www. bluetooth. com
  • IEEE document from http://www. vlsi. ee. upatras. gr/pkitsos/Kitsos_IEEEPC. pdf
  • Sarbanes-Oxley Compliance Journal. 2005. Detecting Bluetooth Security Vulnerabilities. Retrieved July 1, 2006 from http://www. sox. com/News/detail. cfm?articleID= 217
  • Bluejacking. http://www. bluejackq. com/.
  • Bialoglowy, Marek. 2005. Bluetooth Security Review, Part 2. Security Focus. Retrieved on July 1, 2006 from http://www. securityfocus. com/print/infocus/1836.
  • IEEE 802. 15, the Wireless Personal Area Network Working Group. http://www. ieee802. org/15/.
  • E. Ferro and F. Potorti, "Bluetooth and Wi-Fi wireless protocols: A survey and a comparison," IEEE Wireless Commun. , vol. 12, no. 1, pp. 12-16, Feb. 2005.
  • Baker, N. "ZigBee and Bluetooth: Strengths and weaknesses for industrial applications," IEE Computing & Control Engineering, vol. 16, no. 2, pp 20-25, April/May 2005.
  • Sarkar, S. ; Anjum, F. ; Guha, R. , "Optimal communication in bluetooth piconets", IEEE Transactions on Vehicular Technology, Vol. 54, Issue 2, March 2005, pp. 709-721.
  • Dayong Ye; Quan Bai Minjie,"P2P Distributed Intrusion Detections by Using Mobile Agents", Computer and Information Science, 2008. ICIS 08. Seventh IEEE/ACIS International Conference, 23 Sep - 25 Sep 2008, pg. 1-5.
  • Ashraf; A. Gkelias; M. Dohler; A. H. Aghvami, "Time-synchronised multi-piconet Bluetooth environments", IEE Proceedings-Comm. , Vol. 153, Issue 3, June2006, pp. 445-452.
  • Bluetooth Special Interest Group, "The Bluetooth Specification, Core 2. 1+ ERD ", July 26, 2007.
  • Kapil Bhoria, Harish Rohil, "A comparative study of emerging wireless standards: Bluetooth, Wi-Fi, and WiMAX", the 2nd International Conference on Emerging Trends in Engineering and Technology (IETET-2011), Kanipla, Kurukshetra (Haryana).
  • Cambridge Silicon Radio, BlueCore2-Extemal Product Data Sheet. Cambridge, UK, Aug. 2006.
  • S. Lee, "Performance evaluation of IEEE 802. 15. 4 for low-rate wireless personal area networks," IEEE Trans. Consumer Electron. , vol. 52, no. 3, pp. 742-749, Aug. 2006.
  • Charlie Kaufman, Radia Perlman, mike Specinor, "Network Security: PRIVATE Communication in a PUBLIC World, 2nd Edition. "
  • A. Laurie and B. Laurie. Serious flaws in Bluetooth security lead to disclosure of personal data. http://bluestumbler. org.
  • How Bluetooth Works, http://electronics. howstuffworks. com/bluetooth. htm