CFP last date
22 April 2024
Reseach Article

Security Risks in Bluetooth Devices

by Vinayak P. Musale, S. S. Apte
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 51 - Number 1
Year of Publication: 2012
Authors: Vinayak P. Musale, S. S. Apte
10.5120/8003-1308

Vinayak P. Musale, S. S. Apte . Security Risks in Bluetooth Devices. International Journal of Computer Applications. 51, 1 ( August 2012), 1-6. DOI=10.5120/8003-1308

@article{ 10.5120/8003-1308,
author = { Vinayak P. Musale, S. S. Apte },
title = { Security Risks in Bluetooth Devices },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 51 },
number = { 1 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume51/number1/8003-1308/ },
doi = { 10.5120/8003-1308 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:49:15.347352+05:30
%A Vinayak P. Musale
%A S. S. Apte
%T Security Risks in Bluetooth Devices
%J International Journal of Computer Applications
%@ 0975-8887
%V 51
%N 1
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Bluetooth is widely used to link cell phones to their accessories, and its security has not been considered a major problem. This research paper describes the critical problems and the risks that are identified in all Bluetooth-enabled kits that are tested. Also this paper will explain what Bluetooth is, how it works, and some of the vulnerabilities and risks associated with it.

References
  1. The Preliminary Study http://student. vub. ac. be/PreliminaryStudy. html
  2. The Referenced White Paper https://www. bluetooth. org/foundry/sitecontent/document/security_whitepaper_v1
  3. Bluetooth Special Interest Group, 2006, http://www. bluetooth. com
  4. IEEE document from http://www. vlsi. ee. upatras. gr/pkitsos/Kitsos_IEEEPC. pdf
  5. Sarbanes-Oxley Compliance Journal. 2005. Detecting Bluetooth Security Vulnerabilities. Retrieved July 1, 2006 from http://www. sox. com/News/detail. cfm?articleID= 217
  6. Bluejacking. http://www. bluejackq. com/.
  7. Bialoglowy, Marek. 2005. Bluetooth Security Review, Part 2. Security Focus. Retrieved on July 1, 2006 from http://www. securityfocus. com/print/infocus/1836.
  8. IEEE 802. 15, the Wireless Personal Area Network Working Group. http://www. ieee802. org/15/.
  9. E. Ferro and F. Potorti, "Bluetooth and Wi-Fi wireless protocols: A survey and a comparison," IEEE Wireless Commun. , vol. 12, no. 1, pp. 12-16, Feb. 2005.
  10. Baker, N. "ZigBee and Bluetooth: Strengths and weaknesses for industrial applications," IEE Computing & Control Engineering, vol. 16, no. 2, pp 20-25, April/May 2005.
  11. Sarkar, S. ; Anjum, F. ; Guha, R. , "Optimal communication in bluetooth piconets", IEEE Transactions on Vehicular Technology, Vol. 54, Issue 2, March 2005, pp. 709-721.
  12. Dayong Ye; Quan Bai Minjie,"P2P Distributed Intrusion Detections by Using Mobile Agents", Computer and Information Science, 2008. ICIS 08. Seventh IEEE/ACIS International Conference, 23 Sep - 25 Sep 2008, pg. 1-5.
  13. Ashraf; A. Gkelias; M. Dohler; A. H. Aghvami, "Time-synchronised multi-piconet Bluetooth environments", IEE Proceedings-Comm. , Vol. 153, Issue 3, June2006, pp. 445-452.
  14. Bluetooth Special Interest Group, "The Bluetooth Specification, Core 2. 1+ ERD ", July 26, 2007.
  15. Kapil Bhoria, Harish Rohil, "A comparative study of emerging wireless standards: Bluetooth, Wi-Fi, and WiMAX", the 2nd International Conference on Emerging Trends in Engineering and Technology (IETET-2011), Kanipla, Kurukshetra (Haryana).
  16. Cambridge Silicon Radio, BlueCore2-Extemal Product Data Sheet. Cambridge, UK, Aug. 2006.
  17. S. Lee, "Performance evaluation of IEEE 802. 15. 4 for low-rate wireless personal area networks," IEEE Trans. Consumer Electron. , vol. 52, no. 3, pp. 742-749, Aug. 2006.
  18. Charlie Kaufman, Radia Perlman, mike Specinor, "Network Security: PRIVATE Communication in a PUBLIC World, 2nd Edition. "
  19. A. Laurie and B. Laurie. Serious flaws in Bluetooth security lead to disclosure of personal data. http://bluestumbler. org.
  20. How Bluetooth Works, http://electronics. howstuffworks. com/bluetooth. htm
Index Terms

Computer Science
Information Sciences

Keywords

Bluetooth Security Wireless Risks