首页    期刊浏览 2024年08月22日 星期四
登录注册

文章基本信息

  • 标题:A Review on Key Agreement Protocols used in Bluetooth Standard and Security Vulnerabilities in Bluetooth Transmission
  • 本地全文:下载
  • 作者:Trishna Panse ; Vivek Kapoor ; Prashant Panse
  • 期刊名称:International Journal of Information and Communication Technology Research
  • 电子版ISSN:2223-4985
  • 出版年度:2012
  • 卷号:2
  • 期号:3
  • 出版社:IRPN Publishers
  • 摘要:This paper gives an overview of protocols used in Bluetooth communication and security weaknesses and vulnerabilities of the Bluetooth system. Now days, Bluetooth is a frequently used technique for data transmission. Bluetooth standard was come under IEEE 802.15. Its basic features are ad hoc in nature, very low power consumption and low cost. It operates on radio propagation with 2.4GHZ. Various types of security protocols are used to prevent eavesdropping and message interception but still some security weaknesses like no integrity check, man in middle attack, Bluesnarf attack and many more are present in Bluetooth transmission. This paper gives broad overview of the security flaws in Bluetooth.
  • 关键词:Bluetooth; Vulnerability; Eavesdropping; Piconet; Bluesnarf; Authentication; Encryption; E0 stream cipher
国家哲学社会科学文献中心版权所有