Open Access   Article Go Back

A Study on Bluetooth Security Connection and Attacks

M. Dukitha1 , D. Harikrishnan2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-17 , Page no. 1-4, May-2019

Online published on May 22, 2019

Copyright © M. Dukitha, D. Harikrishnan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Dukitha, D. Harikrishnan, “A Study on Bluetooth Security Connection and Attacks,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.1-4, 2019.

MLA Style Citation: M. Dukitha, D. Harikrishnan "A Study on Bluetooth Security Connection and Attacks." International Journal of Computer Sciences and Engineering 07.17 (2019): 1-4.

APA Style Citation: M. Dukitha, D. Harikrishnan, (2019). A Study on Bluetooth Security Connection and Attacks. International Journal of Computer Sciences and Engineering, 07(17), 1-4.

BibTex Style Citation:
@article{Dukitha_2019,
author = {M. Dukitha, D. Harikrishnan},
title = {A Study on Bluetooth Security Connection and Attacks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {17},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1-4},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1297},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1297
TI - A Study on Bluetooth Security Connection and Attacks
T2 - International Journal of Computer Sciences and Engineering
AU - M. Dukitha, D. Harikrishnan
PY - 2019
DA - 2019/05/22
PB - IJCSE, Indore, INDIA
SP - 1-4
IS - 17
VL - 07
SN - 2347-2693
ER -

           

Abstract

Increasing popularity of wireless communication systems, Bluetooth has become one of the most widely used short range wireless protocols. Unfortunately, due to the nature of wireless communication networks, Bluetooth has security vulnerabilities particularly through eavesdropping. Despite newer and more secure versions of Bluetooth being released, older versions such as Bluetooth four.0 and 4.1 are still widespread all over the world. After thoroughly exploring the current Bluetooth security model and reasons for potential vulnerability, this report performs a comparative analysis of different Bluetooth security attacks, extending them and applying them to readily accessible devices, and offering countermeasures. Based on our results and discussion, it`s clear that Bluetooth is a widespread technology with significant security vulnerabilities in the real world today.

Key-Words / Index Term

Bluetooth,wifi-security,wireless protocal

References

[1] Bluetooth.org. New Bluetooth Specifications Enable IP Connectivity and Deliver Industry-leading Privacy and Increased Speed. Technical report, Bluetooth Special Interest Group, 2014. http: //www.bluetooth.com/Pages/PressReleases-Detail.aspx?ItemID=220.
[2] Bluetooth.org. History of the Bluetooth Special Interest Group. Technical report, Bluetooth Special Interest Group, Available on February 2015. http://www.bluetooth.com/Pages/ History-of-Bluetooth.aspx.
[3] Bluetooth.org. Security, Bluetooth Smart (Low Energy). Technical report, Bluetooth Special Interest Group, 2015. https://developer. bluetooth.org/TechnologyOverview/ Pages/LE-Security.aspx.
[4] Bluetooth.org. The Low Energy Technology Behind Bluetooth Smart. Technical report, Bluetooth Special Interest Group, Available on February 2015. http://www.bluetooth.com/Pages/ low-energy-tech-info.aspx.
[5] J. P. Carles Gomez, Joaquim Oller. Overview and Evaluation of Bluetooth Low Energy: An Emerging LowPower Wireless Technology. Technical report, Universitat Politôlcnica de Catalunya/Fundaciøs i2Cat, August 2012. http://www.mdpi.com/1424- 8220/12/9/11734/htm.
[6] V. Gao. Everything that you always want to know about Bluetooth security in Bluetooth 4.1. Technical report, Bluetooth Special Interest Group, 2014. http: //blog.bluetooth.com/everythingyou-always-wanted-to-know-aboutbluetooth-security-in-bluetooth-4- 2/.
[7] R. Heydon. “Bluetooth Low Energy: the developer’s handbook”, Vol.0,2013.
[8] S. A. Joe Decuir. Bluetooth 4.0: Low Energy. Technical report, CSR plc,Available on February 2015. http://chapters.comsoc.org/ vancouver/BTLER3.pdf.
[9] A. West. Smartphone, the key for Bluetooth low energy technology. Technical report, IMS Research, Available on February 2015. http://www.bluetooth. com/Pages/Smartphones.aspx.