[{“box”:0,”content”:”
n
n
u00a0A. Singh, Soumya Gupta,
[/foreach]
nJanuary 9, 2023 at 6:25 am
n
nAbstract
n
Bluetooth is a new RF short range wireless personnel Area Network (PAN) which is designed for wireless communication between different devices. Starting from the headset cable replacement it has been extended to support flexible ad-hoc networks. It is gaining increasing popularity and acceptance in the world today. The current data rate for Bluetooth is 1 Mbps. However, as Bluetooth technology is becoming widespread, vulnerabilities in its security are increasing which can be dangerous to the user’s personal information. This study first gives some background information about Bluetooth system and presents the malicious intervention about the attacks on devices while connecting with other devices during the exchange of data and then it concentrates on specific security measures mainly authentication, encryption.
n
Keywords Bluetooth security, pairing, malicious attackers, network security, Man-in-the-middle attack (MIM).
n
n
n
n
n[if 992 equals=”Transformative”]
[/if 992][if 992 not_equal=”Transformative”]
[/if 992] n
nn
n[/if 379]
n
References
n[if 1104 equals=””]n
1. Nateq Be-Nazir Ibn Minar, Mohammed Tarique. Bluetooth Security Threats and Solution: A Survey. In International Journal of Distributed and Parallel Systems (IJDPS). 2012 Jan; 3(1): 127–148.
2. Trishna Panse, Prashant Panse. A Survey on Security Threats and Vulnerability attacks on Bluetooth Communication. International Journal of Computer Science and Information Technologies (IJCSIT). 2013; 4(5): 741–746. ISSN: 0975-9646.
3. Tzu-Chang Yeh, Jian-Ren Peng, Sheng-Shih Wang, Jun-Ping Hsu. Securing Bluetooth communication. Int J Netw Secur. 2012 Jul; 14(4): 229–235.
4. Praveen Kumar Mishra. Bluetooth Security Threats. International Journal of Computer Science & Engineering Technology (IJCSET). 2013; 4(2): 147–151.
5. Dieter Gollmann. Computer security. 2nd Edn. Wiley; 2007 Jan 1. Paperback.
6. Satwant Kaur First Lady of Emerging Technologies. USA: Silicon Valley; 2014.
7. Tarun Kumar. Improving pairing mechanism in Bluetooth security. International Journal of Recent Trends in Engineering. 2009 Nov; 2(2): 165–169.
8. Karen Scarfone, John Padgette. Guide to Bluetooth Security. USA: NSIT; 2012, Jun 30. Paperback.
nn[/if 1104] [if 1104 not_equal=””]n
- [foreach 1102]n t
- [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
n[/foreach]
n[/if 1104]
n[if 1114 equals=”Yes”]n
n[/if 1114]
n
n
n
Journal Menu
Editors Overview
ijmet maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.
n
“},{“box”:4,”content”:”
n“},{“box”:1,”content”:”
- By [foreach 286]n
-
n
A. Singh, Soumya Gupta
n
[/foreach]
n
- [foreach 286] [if 1175 not_equal=””]n t
- Assistant Professor, Student,Bansal Institute of Engineering and Technology, Bansal Institute of Engineering and Technology Lucknow,Lucknow, Uttar Pradesh, Uttar Pradesh,India, India
n[/if 1175][/foreach]
n
n
n
Abstract
nBluetooth is a new RF short range wireless personnel Area Network (PAN) which is designed for wireless communication between different devices. Starting from the headset cable replacement it has been extended to support flexible ad-hoc networks. It is gaining increasing popularity and acceptance in the world today. The current data rate for Bluetooth is 1 Mbps. However, as Bluetooth technology is becoming widespread, vulnerabilities in its security are increasing which can be dangerous to the user’s personal information. This study first gives some background information about Bluetooth system and presents the malicious intervention about the attacks on devices while connecting with other devices during the exchange of data and then it concentrates on specific security measures mainly authentication, encryption.n
n
Keywords: Bluetooth security, pairing, malicious attackers, network security, Man-in-the-middle attack (MIM).
n[if 424 equals=”Regular Issue”][This article belongs to International Journal of Microwave Engineering and Technology(ijmet)]
n
n
n
n[if 992 equals=”Transformative”]n
Full Text
n
n
nn[/if 992]n[if 992 not_equal=”Transformative”]n
n
n
[/if 992]n[if 379 not_equal=””]
Browse Figures
n
n
[/if 379]n
References
n[if 1104 equals=””]
1. Nateq Be-Nazir Ibn Minar, Mohammed Tarique. Bluetooth Security Threats and Solution: A Survey. In International Journal of Distributed and Parallel Systems (IJDPS). 2012 Jan; 3(1): 127–148.
2. Trishna Panse, Prashant Panse. A Survey on Security Threats and Vulnerability attacks on Bluetooth Communication. International Journal of Computer Science and Information Technologies (IJCSIT). 2013; 4(5): 741–746. ISSN: 0975-9646.
3. Tzu-Chang Yeh, Jian-Ren Peng, Sheng-Shih Wang, Jun-Ping Hsu. Securing Bluetooth communication. Int J Netw Secur. 2012 Jul; 14(4): 229–235.
4. Praveen Kumar Mishra. Bluetooth Security Threats. International Journal of Computer Science & Engineering Technology (IJCSET). 2013; 4(2): 147–151.
5. Dieter Gollmann. Computer security. 2nd Edn. Wiley; 2007 Jan 1. Paperback.
6. Satwant Kaur First Lady of Emerging Technologies. USA: Silicon Valley; 2014.
7. Tarun Kumar. Improving pairing mechanism in Bluetooth security. International Journal of Recent Trends in Engineering. 2009 Nov; 2(2): 165–169.
8. Karen Scarfone, John Padgette. Guide to Bluetooth Security. USA: NSIT; 2012, Jun 30. Paperback.
n[/if 1104][if 1104 not_equal=””]n
- [foreach 1102]n t
- [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
n[/foreach]
n[/if 1104]
n
n[if 1114 equals=”Yes”]n
n[/if 1114]”},{“box”:2,”content”:”
n
n
International Journal of Microwave Engineering and Technology
n
n
n
n
n
n
Volume | 8 |
Issue | 1 |
Received | June 3, 2021 |
Accepted | June 10, 2021 |
Published | June 16, 2021 |
n
n
n
n
n
n
n
n
n
n n
n”},{“box”:6,”content”:”“}]