Bluetooth Intrusion Techniques

Jesús Antonio Alvarez-cedillo, Patricia Perez-romero, Miguel Hernandez-bolaños

Research output: Contribution to journalArticlepeer-review

Abstract

Bluetooth technology has grown through the years, but because of the increase , security has become an issue. In all the world the people interacting and use this technology, when transferring data through devices or when using the computer or personal devices, null confidentiality and null authenticity are factors to remain secure. How this technology are very common, malicious exploits attack all time searching find access. In this paper we shown different exploits and vulnerabilities that are either in the design already, or have been maliciously exploited. Some of these exploits are Bluesnarfing, Bluejacking, Bluebugging, etc. By understanding these exploits, one can gain a general idea of how vulnerable Bluetooth possibly could be.
Original languageAmerican English
Pages (from-to)208-215
Number of pages8
JournalIRACST-International Journal of Computer Science and Information Technology & Security (IJCSITS)
Volume2
Issue number1
StatePublished - 2012

Keywords

  • - mac address -
  • b luetooth
  • bluebugging - safer
  • bluejacking
  • bluesnarfing
  • dos attack - intrusion

Fingerprint

Dive into the research topics of 'Bluetooth Intrusion Techniques'. Together they form a unique fingerprint.

Cite this