BLUETOOTH SECURITY THREATS

Abstract

Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. The proliferation of the Bluetooth devices in the workplace exposes organizations to security risks. Bluetooth technology and associated devices are susceptible to general wireless networking threats, such as denial of service attack, eavesdropping, man-in-the-middle attacks, message modification, and resource misappropriation. Preventing unauthorized users from secure communication is a challenge to the pairing process.

Authors and Affiliations

Praveen Kumar Mishra

Keywords

Related Articles

A Survey of Various Load Balancing Techniques and Proposed Load Balancing Method in Cloud Computing.

The Cloud Computing data Centre has abundant hosts as well as Solicitation requests. A Cloud Computing platform that manoeuvre behind the corporate firewall and within control of an organisation IT department. Cloud deal...

An Efficient Approach to Minimize Data Collection Delay in Wireless Sensor Networks

Data assortment latency might become higher attributable to the comparatively slow travel speed of mobile components . Thus , the planning of mobile components , i.e. , however they traverse through the sensing field and...

Performance of I-LEACH Routing protocol for Wireless Sensor Networks

In wireless sensor networks, sensor node always have a limited power resource. The energy consumed by sensor nodes to transfer the data to its destination becomes critical issue in designing WSN routing protocols. In thi...

Secure Routing Using ASOR Protocol for MANETs

Privacy protection is one of the critical issues in Mobile Adhoc Networks. To provide unobservability and unlinkability on the network was the major requirements. Although ,there was number of secure protocols available...

Enhancement of old manuscripts using fuzzy logic

Old manuscripts are very important which contain important information about a person, place, or event. Image processing is very vast field and one of the most important part of image processing is thresholding. . The ol...

Download PDF file
  • EP ID EP103884
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

Praveen Kumar Mishra (2013). BLUETOOTH SECURITY THREATS. International Journal of Computer Science & Engineering Technology, 4(2), 147-151. https://europub.co.uk./articles/-A-103884