Bluetooth And Its Inherent Security Issues

ثبت نشده
چکیده

Bluetooth technology is slowly becoming more popular but the security built into the specification is a cause for concern. More and more consumer products used in normal daily life are manufactured with Bluetooth systems such as cell phones, PDA's and mobile computers. It is important that consumers understand the technology and the risks involved in the use thereof. Some of those risks range from loss of productivity to loss of confidentiality and can stem from default configuration, theft and loss, eavesdropping and ...

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bluetooth And Its Inherent Security Issues

Bluetooth technology is slowly becoming more popular but the security built into the specification is a cause for concern. More and more consumer products used in normal daily life are manufactured with Bluetooth systems such as cell phones, PDA's and mobile computers. It is important that consumers understand the technology and the risks involved in the use thereof. Some of those risks range f...

متن کامل

On Bluetooth security

In this paper we discuss several aspects of the security of Bluetooth. Apart from security, several privacy issues linked to the use of Bluetooth protocols are also discussed. The focus is on the lower layer protocols, called the core Bluetooth protocols, thus security aspects of application profiles are left out of the scope of this document. We give a summary of the networking protocols of Bl...

متن کامل

Design, Implementation, and Evaluation of Bluetooth Security

Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. This article provides a study on the security issues behind the Bluetooth standard. After a overview of the general Bluetooth protocol, a security fr...

متن کامل

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

A Service-Level Security Protocol for Bluetooth Scatternets

Bluetooth is the term used to describe the protocol of short-range, and frequency hopping radio link between devices. Bluetooth enables users to connect wirelessly to a wide range of computing and communication devices easily and it provides opportunities for rapid ad hoc connections. In this type of networks, security is one of the main issues. Bluetooth link-level security provides authentica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017