首页    期刊浏览 2025年02月20日 星期四
登录注册

文章基本信息

  • 标题:Bluetooth Security Threats And Solutions: A Survey
  • 本地全文:下载
  • 作者:Nateq Be-Nazir Ibn Minar ; Mohammed Tarique
  • 期刊名称:International Journal of Distributed and Parallel Systems
  • 印刷版ISSN:2229-3957
  • 电子版ISSN:0976-9757
  • 出版年度:2012
  • 卷号:3
  • 期号:1
  • DOI:10.5121/ijdps.2012.3110
  • 出版社:Academy & Industry Research Collaboration Center (AIRCC)
  • 摘要:Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. The security issues of Bluetooth have been an active area of research for the last few years. This paper presents the vulnerabilities in the security protocols of this technology along with some past security threats and possible countermeasures as reported in the literatures which have been surveyed and summarized in this paper. It also presents some tips that end-users can implement immediately to become more cautious about their private information. Finally, the paper concludes with some recommendations for future security enhancements that can be implemented in the Bluetooth standard.
  • 关键词:Bluetooth technology has become an integral part of this modern society. The availability of mobile;phones; game controllers; Personal Digital Assistant (PDA) and personal computers has made Bluetooth;a popular technology for short range wireless communication. However; as the Bluetooth technology;becomes widespread; vulnerabilities in its security protocols are increasing which can be potentially;dangerous to the privacy of a user’s personal information. The security issues of Bluetooth have been an;active area of research for the last few years. This paper presents the vulnerabilities in the security;protocols of this technology along with some past security threats and possible countermeasures as;reported in the literatures which have been surveyed and summarized in this paper. It also presents some;tips that end-users can implement immediately to become more cautious about their private information.;Finally; the paper concludes with some recommendations for future security enhancements that can be;implemented in the Bluetooth standard.
国家哲学社会科学文献中心版权所有