TY - JOUR
T1 - Bluetooth Intrusion Techniques
AU - Alvarez-cedillo, Jesús Antonio
AU - Perez-romero, Patricia
AU - Hernandez-bolaños, Miguel
PY - 2012
Y1 - 2012
N2 - Bluetooth technology has grown through the years, but because of the increase , security has become an issue. In all the world the people interacting and use this technology, when transferring data through devices or when using the computer or personal devices, null confidentiality and null authenticity are factors to remain secure. How this technology are very common, malicious exploits attack all time searching find access. In this paper we shown different exploits and vulnerabilities that are either in the design already, or have been maliciously exploited. Some of these exploits are Bluesnarfing, Bluejacking, Bluebugging, etc. By understanding these exploits, one can gain a general idea of how vulnerable Bluetooth possibly could be.
AB - Bluetooth technology has grown through the years, but because of the increase , security has become an issue. In all the world the people interacting and use this technology, when transferring data through devices or when using the computer or personal devices, null confidentiality and null authenticity are factors to remain secure. How this technology are very common, malicious exploits attack all time searching find access. In this paper we shown different exploits and vulnerabilities that are either in the design already, or have been maliciously exploited. Some of these exploits are Bluesnarfing, Bluejacking, Bluebugging, etc. By understanding these exploits, one can gain a general idea of how vulnerable Bluetooth possibly could be.
KW - - mac address -
KW - b luetooth
KW - bluebugging - safer
KW - bluejacking
KW - bluesnarfing
KW - dos attack - intrusion
UR - https://ijcsits.org/papers/Vol2no12012/36vol2no1.pdf
UR - http://www.mendeley.com/research/bluetooth-intrusion-techniques
M3 - Article
VL - 2
SP - 208
EP - 215
JO - IRACST-International Journal of Computer Science and Information Technology & Security (IJCSITS)
JF - IRACST-International Journal of Computer Science and Information Technology & Security (IJCSITS)
IS - 1
ER -