Call for Paper - June 2018 Edition
IJCA solicits original research papers for the June 2018 Edition. Last date of manuscript submission is May 21, 2018. Read More

Security Risks in Bluetooth Devices

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 51 - Number 1
Year of Publication: 2012
Vinayak P. Musale
S. S. Apte

Vinayak P Musale and S S Apte. Article: Security Risks in Bluetooth Devices. International Journal of Computer Applications 51(1):1-6, August 2012. Full text available. BibTeX

	author = {Vinayak P. Musale and S. S. Apte},
	title = {Article: Security Risks in Bluetooth Devices},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {51},
	number = {1},
	pages = {1-6},
	month = {August},
	note = {Full text available}


The Bluetooth is widely used to link cell phones to their accessories, and its security has not been considered a major problem. This research paper describes the critical problems and the risks that are identified in all Bluetooth-enabled kits that are tested. Also this paper will explain what Bluetooth is, how it works, and some of the vulnerabilities and risks associated with it.


  • The Preliminary Study http://student. vub. ac. be/PreliminaryStudy. html
  • The Referenced White Paper https://www. bluetooth. org/foundry/sitecontent/document/security_whitepaper_v1
  • Bluetooth Special Interest Group, 2006, http://www. bluetooth. com
  • IEEE document from http://www. vlsi. ee. upatras. gr/pkitsos/Kitsos_IEEEPC. pdf
  • Sarbanes-Oxley Compliance Journal. 2005. Detecting Bluetooth Security Vulnerabilities. Retrieved July 1, 2006 from http://www. sox. com/News/detail. cfm?articleID= 217
  • Bluejacking. http://www. bluejackq. com/.
  • Bialoglowy, Marek. 2005. Bluetooth Security Review, Part 2. Security Focus. Retrieved on July 1, 2006 from http://www. securityfocus. com/print/infocus/1836.
  • IEEE 802. 15, the Wireless Personal Area Network Working Group. http://www. ieee802. org/15/.
  • E. Ferro and F. Potorti, "Bluetooth and Wi-Fi wireless protocols: A survey and a comparison," IEEE Wireless Commun. , vol. 12, no. 1, pp. 12-16, Feb. 2005.
  • Baker, N. "ZigBee and Bluetooth: Strengths and weaknesses for industrial applications," IEE Computing & Control Engineering, vol. 16, no. 2, pp 20-25, April/May 2005.
  • Sarkar, S. ; Anjum, F. ; Guha, R. , "Optimal communication in bluetooth piconets", IEEE Transactions on Vehicular Technology, Vol. 54, Issue 2, March 2005, pp. 709-721.
  • Dayong Ye; Quan Bai Minjie,"P2P Distributed Intrusion Detections by Using Mobile Agents", Computer and Information Science, 2008. ICIS 08. Seventh IEEE/ACIS International Conference, 23 Sep - 25 Sep 2008, pg. 1-5.
  • Ashraf; A. Gkelias; M. Dohler; A. H. Aghvami, "Time-synchronised multi-piconet Bluetooth environments", IEE Proceedings-Comm. , Vol. 153, Issue 3, June2006, pp. 445-452.
  • Bluetooth Special Interest Group, "The Bluetooth Specification, Core 2. 1+ ERD ", July 26, 2007.
  • Kapil Bhoria, Harish Rohil, "A comparative study of emerging wireless standards: Bluetooth, Wi-Fi, and WiMAX", the 2nd International Conference on Emerging Trends in Engineering and Technology (IETET-2011), Kanipla, Kurukshetra (Haryana).
  • Cambridge Silicon Radio, BlueCore2-Extemal Product Data Sheet. Cambridge, UK, Aug. 2006.
  • S. Lee, "Performance evaluation of IEEE 802. 15. 4 for low-rate wireless personal area networks," IEEE Trans. Consumer Electron. , vol. 52, no. 3, pp. 742-749, Aug. 2006.
  • Charlie Kaufman, Radia Perlman, mike Specinor, "Network Security: PRIVATE Communication in a PUBLIC World, 2nd Edition. "
  • A. Laurie and B. Laurie. Serious flaws in Bluetooth security lead to disclosure of personal data. http://bluestumbler. org.
  • How Bluetooth Works, http://electronics. howstuffworks. com/bluetooth. htm