Research Article

Security Risks in Bluetooth Devices

by  Vinayak P. Musale, S. S. Apte
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 51 - Issue 1
Published: August 2012
Authors: Vinayak P. Musale, S. S. Apte
10.5120/8003-1308
PDF

Vinayak P. Musale, S. S. Apte . Security Risks in Bluetooth Devices. International Journal of Computer Applications. 51, 1 (August 2012), 1-6. DOI=10.5120/8003-1308

                        @article{ 10.5120/8003-1308,
                        author  = { Vinayak P. Musale,S. S. Apte },
                        title   = { Security Risks in Bluetooth Devices },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 51 },
                        number  = { 1 },
                        pages   = { 1-6 },
                        doi     = { 10.5120/8003-1308 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A Vinayak P. Musale
                        %A S. S. Apte
                        %T Security Risks in Bluetooth Devices%T 
                        %J International Journal of Computer Applications
                        %V 51
                        %N 1
                        %P 1-6
                        %R 10.5120/8003-1308
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

The Bluetooth is widely used to link cell phones to their accessories, and its security has not been considered a major problem. This research paper describes the critical problems and the risks that are identified in all Bluetooth-enabled kits that are tested. Also this paper will explain what Bluetooth is, how it works, and some of the vulnerabilities and risks associated with it.

References
  • The Preliminary Study http://student. vub. ac. be/PreliminaryStudy. html
  • The Referenced White Paper https://www. bluetooth. org/foundry/sitecontent/document/security_whitepaper_v1
  • Bluetooth Special Interest Group, 2006, http://www. bluetooth. com
  • IEEE document from http://www. vlsi. ee. upatras. gr/pkitsos/Kitsos_IEEEPC. pdf
  • Sarbanes-Oxley Compliance Journal. 2005. Detecting Bluetooth Security Vulnerabilities. Retrieved July 1, 2006 from http://www. sox. com/News/detail. cfm?articleID= 217
  • Bluejacking. http://www. bluejackq. com/.
  • Bialoglowy, Marek. 2005. Bluetooth Security Review, Part 2. Security Focus. Retrieved on July 1, 2006 from http://www. securityfocus. com/print/infocus/1836.
  • IEEE 802. 15, the Wireless Personal Area Network Working Group. http://www. ieee802. org/15/.
  • E. Ferro and F. Potorti, "Bluetooth and Wi-Fi wireless protocols: A survey and a comparison," IEEE Wireless Commun. , vol. 12, no. 1, pp. 12-16, Feb. 2005.
  • Baker, N. "ZigBee and Bluetooth: Strengths and weaknesses for industrial applications," IEE Computing & Control Engineering, vol. 16, no. 2, pp 20-25, April/May 2005.
  • Sarkar, S. ; Anjum, F. ; Guha, R. , "Optimal communication in bluetooth piconets", IEEE Transactions on Vehicular Technology, Vol. 54, Issue 2, March 2005, pp. 709-721.
  • Dayong Ye; Quan Bai Minjie,"P2P Distributed Intrusion Detections by Using Mobile Agents", Computer and Information Science, 2008. ICIS 08. Seventh IEEE/ACIS International Conference, 23 Sep - 25 Sep 2008, pg. 1-5.
  • Ashraf; A. Gkelias; M. Dohler; A. H. Aghvami, "Time-synchronised multi-piconet Bluetooth environments", IEE Proceedings-Comm. , Vol. 153, Issue 3, June2006, pp. 445-452.
  • Bluetooth Special Interest Group, "The Bluetooth Specification, Core 2. 1+ ERD ", July 26, 2007.
  • Kapil Bhoria, Harish Rohil, "A comparative study of emerging wireless standards: Bluetooth, Wi-Fi, and WiMAX", the 2nd International Conference on Emerging Trends in Engineering and Technology (IETET-2011), Kanipla, Kurukshetra (Haryana).
  • Cambridge Silicon Radio, BlueCore2-Extemal Product Data Sheet. Cambridge, UK, Aug. 2006.
  • S. Lee, "Performance evaluation of IEEE 802. 15. 4 for low-rate wireless personal area networks," IEEE Trans. Consumer Electron. , vol. 52, no. 3, pp. 742-749, Aug. 2006.
  • Charlie Kaufman, Radia Perlman, mike Specinor, "Network Security: PRIVATE Communication in a PUBLIC World, 2nd Edition. "
  • A. Laurie and B. Laurie. Serious flaws in Bluetooth security lead to disclosure of personal data. http://bluestumbler. org.
  • How Bluetooth Works, http://electronics. howstuffworks. com/bluetooth. htm
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Bluetooth Security Wireless Risks

Powered by PhDFocusTM