Bluetooth vulnerability analysis
Abstract
Attacks on personal data everyday become popular among hackers. Bluetooth is a kind of wireless network for file sharing between two devices, characterized by low cost, power, complexity and reliability, is a vulnerability to security protocols as well as user privacy. The purpose of the article is to analyze the shortcomings of Bluetooth security.References
N. Be-Nazir Ibn Minar and M. Tarique, “Bluetooth Security Threats and Solution” A Survey. In International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012.
V. Tsira, G. Nandi, “Bluetooth Technology: Security Issues and Its Prevention” A Survey. In International Journal of Computer Technology and Applications (IJCTA) Vol.5, No.5, October 2014.
D. Antonioli, N. Ole Tippenhauer, K. Rasmussen, “KNOB Attack. Key Negotiation of Bluetooth Attack: Breaking Bluetooth Security.”, 28th USENIX Security Symposium, August 2019.
M. Dinney, “McKenzie interchange Project – Travel Time Monitoring System: Technology Review”, February 2016.
D. Goodin “New Attack exploiting serious Bluetooth weakness can intercept sensitive data", August 2019.