DOI: https://doi.org/10.30837/IVcsitic2020201362

Bluetooth vulnerability analysis

Yana-Mariia Samoilova

Анотація


Attacks on personal data everyday become popular among hackers. Bluetooth is a kind of wireless network for file sharing between two devices, characterized by low cost, power, complexity and reliability, is a vulnerability to security protocols as well as user privacy. The purpose of the article is to analyze the shortcomings of Bluetooth security.

Повний текст:

PDF

Посилання


N. Be-Nazir Ibn Minar and M. Tarique, “Bluetooth Security Threats and Solution” A Survey. In International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012.

V. Tsira, G. Nandi, “Bluetooth Technology: Security Issues and Its Prevention” A Survey. In International Journal of Computer Technology and Applications (IJCTA) Vol.5, No.5, October 2014.

D. Antonioli, N. Ole Tippenhauer, K. Rasmussen, “KNOB Attack. Key Negotiation of Bluetooth Attack: Breaking Bluetooth Security.”, 28th USENIX Security Symposium, August 2019.

M. Dinney, “McKenzie interchange Project – Travel Time Monitoring System: Technology Review”, February 2016.

D. Goodin “New Attack exploiting serious Bluetooth weakness can intercept sensitive data", August 2019.


Посилання

  • Поки немає зовнішніх посилань.