Bluetooth vulnerability analysis

Authors

  • Yana-Mariia Samoilova Odessa National Polytechnic University, Ukraine

Abstract

Attacks on personal data everyday become popular among hackers. Bluetooth is a kind of wireless network for file sharing between two devices, characterized by low cost, power, complexity and reliability, is a vulnerability to security protocols as well as user privacy. The purpose of the article is to analyze the shortcomings of Bluetooth security.

References

N. Be-Nazir Ibn Minar and M. Tarique, “Bluetooth Security Threats and Solution” A Survey. In International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012.

V. Tsira, G. Nandi, “Bluetooth Technology: Security Issues and Its Prevention” A Survey. In International Journal of Computer Technology and Applications (IJCTA) Vol.5, No.5, October 2014.

D. Antonioli, N. Ole Tippenhauer, K. Rasmussen, “KNOB Attack. Key Negotiation of Bluetooth Attack: Breaking Bluetooth Security.”, 28th USENIX Security Symposium, August 2019.

M. Dinney, “McKenzie interchange Project – Travel Time Monitoring System: Technology Review”, February 2016.

D. Goodin “New Attack exploiting serious Bluetooth weakness can intercept sensitive data", August 2019.

Published

2020-04-23

Issue

Section

RELIABILITY AND SAFETY ASSURANCE TECHNOLOGIES FOR COMPUTER AND INFORMATIONAL SYSTEMS