IJMET

Bluetooth Technology: Security Issues and its Prevention

[{“box”:0,”content”:”

n

n

 > 

n

n

 > 

n

n

n

n

n

n

n

By [foreach 286]u00a0

u00a0A. Singh, Soumya Gupta,

[/foreach]
nJanuary 9, 2023 at 6:25 am

n

nAbstract

n

Bluetooth is a new RF short range wireless personnel Area Network (PAN) which is designed for wireless communication between different devices. Starting from the headset cable replacement it has been extended to support flexible ad-hoc networks. It is gaining increasing popularity and acceptance in the world today. The current data rate for Bluetooth is 1 Mbps. However, as Bluetooth technology is becoming widespread, vulnerabilities in its security are increasing which can be dangerous to the user’s personal information. This study first gives some background information about Bluetooth system and presents the malicious intervention about the attacks on devices while connecting with other devices during the exchange of data and then it concentrates on specific security measures mainly authentication, encryption.

n

n

n

n

Volume :u00a0u00a08 | Issue :u00a0u00a01 | Received :u00a0u00a0June 3, 2021 | Accepted :u00a0u00a0June 10, 2021 | Published :u00a0u00a0June 16, 2021n[if 424 equals=”Regular Issue”][This article belongs to International Journal of Microwave Engineering and Technology(ijmet)] [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue Bluetooth Technology: Security Issues and its Prevention under section in International Journal of Microwave Engineering and Technology(ijmet)] [/if 424]
Keywords Bluetooth security, pairing, malicious attackers, network security, Man-in-the-middle attack (MIM).

n

n

n

n

n


n[if 992 equals=”Transformative”]

n

n

Full Text

n

n

n

[/if 992][if 992 not_equal=”Transformative”]

n

n

Full Text

n

n

n

[/if 992] n


nn

[if 379 not_equal=””]n

[foreach 379]n

n[/foreach]

n[/if 379]

n

References

n[if 1104 equals=””]n

1. Nateq Be-Nazir Ibn Minar, Mohammed Tarique. Bluetooth Security Threats and Solution: A Survey. In International Journal of Distributed and Parallel Systems (IJDPS). 2012 Jan; 3(1): 127–148.
2. Trishna Panse, Prashant Panse. A Survey on Security Threats and Vulnerability attacks on Bluetooth Communication. International Journal of Computer Science and Information Technologies (IJCSIT). 2013; 4(5): 741–746. ISSN: 0975-9646.
3. Tzu-Chang Yeh, Jian-Ren Peng, Sheng-Shih Wang, Jun-Ping Hsu. Securing Bluetooth communication. Int J Netw Secur. 2012 Jul; 14(4): 229–235.
4. Praveen Kumar Mishra. Bluetooth Security Threats. International Journal of Computer Science & Engineering Technology (IJCSET). 2013; 4(2): 147–151.
5. Dieter Gollmann. Computer security. 2nd Edn. Wiley; 2007 Jan 1. Paperback.
6. Satwant Kaur First Lady of Emerging Technologies. USA: Silicon Valley; 2014.
7. Tarun Kumar. Improving pairing mechanism in Bluetooth security. International Journal of Recent Trends in Engineering. 2009 Nov; 2(2): 165–169.
8. Karen Scarfone, John Padgette. Guide to Bluetooth Security. USA: NSIT; 2012, Jun 30. Paperback.

nn[/if 1104] [if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
  2. n[/foreach]

n[/if 1104]

n[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=”Regular Issue”] Regular Issue[/if 424] Open Access Article

n

International Journal of Microwave Engineering and Technology

ISSN: 2455-0337

Editors Overview

ijmet maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

“},{“box”:4,”content”:”

n“},{“box”:1,”content”:”

    By  [foreach 286]n

  1. n

    A. Singh, Soumya Gupta

    n

  2. [/foreach]

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Assistant Professor, Student,Bansal Institute of Engineering and Technology, Bansal Institute of Engineering and Technology Lucknow,Lucknow, Uttar Pradesh, Uttar Pradesh,India, India
  2. n[/if 1175][/foreach]

n

n

n

n

n

Abstract

nBluetooth is a new RF short range wireless personnel Area Network (PAN) which is designed for wireless communication between different devices. Starting from the headset cable replacement it has been extended to support flexible ad-hoc networks. It is gaining increasing popularity and acceptance in the world today. The current data rate for Bluetooth is 1 Mbps. However, as Bluetooth technology is becoming widespread, vulnerabilities in its security are increasing which can be dangerous to the user’s personal information. This study first gives some background information about Bluetooth system and presents the malicious intervention about the attacks on devices while connecting with other devices during the exchange of data and then it concentrates on specific security measures mainly authentication, encryption.n

n

n

Keywords: Bluetooth security, pairing, malicious attackers, network security, Man-in-the-middle attack (MIM).

n[if 424 equals=”Regular Issue”][This article belongs to International Journal of Microwave Engineering and Technology(ijmet)]

n[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Microwave Engineering and Technology(ijmet)] [/if 424]

n

n

n


n[if 992 equals=”Transformative”]n

n

n

Full Text

n

n

nn[/if 992]n[if 992 not_equal=”Transformative”]n

n

Full Text

n

n

n

n


[/if 992]n[if 379 not_equal=””]

Browse Figures

n

n

[foreach 379]n

n[/foreach]

n

[/if 379]n

n

References

n[if 1104 equals=””]

1. Nateq Be-Nazir Ibn Minar, Mohammed Tarique. Bluetooth Security Threats and Solution: A Survey. In International Journal of Distributed and Parallel Systems (IJDPS). 2012 Jan; 3(1): 127–148.
2. Trishna Panse, Prashant Panse. A Survey on Security Threats and Vulnerability attacks on Bluetooth Communication. International Journal of Computer Science and Information Technologies (IJCSIT). 2013; 4(5): 741–746. ISSN: 0975-9646.
3. Tzu-Chang Yeh, Jian-Ren Peng, Sheng-Shih Wang, Jun-Ping Hsu. Securing Bluetooth communication. Int J Netw Secur. 2012 Jul; 14(4): 229–235.
4. Praveen Kumar Mishra. Bluetooth Security Threats. International Journal of Computer Science & Engineering Technology (IJCSET). 2013; 4(2): 147–151.
5. Dieter Gollmann. Computer security. 2nd Edn. Wiley; 2007 Jan 1. Paperback.
6. Satwant Kaur First Lady of Emerging Technologies. USA: Silicon Valley; 2014.
7. Tarun Kumar. Improving pairing mechanism in Bluetooth security. International Journal of Recent Trends in Engineering. 2009 Nov; 2(2): 165–169.
8. Karen Scarfone, John Padgette. Guide to Bluetooth Security. USA: NSIT; 2012, Jun 30. Paperback.

n[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


n[if 1114 equals=”Yes”]n

n[/if 1114]”},{“box”:2,”content”:”

Regular Issue Open Access Article

n

n

n

n

n

International Journal of Microwave Engineering and Technology

n

[if 344 not_equal=””]ISSN: 2455-0337[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 8
Issue 1
Received June 3, 2021
Accepted June 10, 2021
Published June 16, 2021

n

n

n

n

Editor

n

n


n

Reviewer

n

n


n n

n”},{“box”:6,”content”:”“}]

Read More
IJMET, Special Issue

Introduction to Microwave Amplifiers, Transmitters, and Planar Circuits

[{“box”:0,”content”:”

n

n

International Journal of Microwave Engineering and Technology

ISSN: 2455-0337

Editors Overview

ijmet maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

n

n

n

n

n

Open Access

n

Special Issue

n

Topic

n

n Introduction to Microwave Amplifiers, Transmitters, and Planar Circuitsn

n

Abstract Submission Deadline : November 30, 2023

n

Manuscript Submission Deadline : December 25, 2023

n [if 457 equals=”Special Issue”]

[This article belongs to Special Issue Introduction to Microwave Amplifiers, Transmitters, and Planar Circuits under section ijmet in International Journal of Microwave Engineering and Technology(ijmet)] [/if 457]n

n Special Issue Descriptionn

A microwave amplifier is a device that boosts a microwave device’s output power signal, typically by boosting the wave’s amplitude or height, which is directly proportional to its power level. This is done by increasing the microwave device’s input power so that its microwave radiation carries more energy. These amplifiers are typically employed by the military for electronic warfare, radar systems, and broadband communications. They operate at low frequencies of the radio wave spectrum, typically in the range of 300 megahertz or higher.

n [if 233 not_equal=””]Editor [foreach 234]n

,

n [/foreach][/if 233]n Keywordsn n Manuscript Submission informationn

Manuscripts should be submitted online via the manuscript Engine. Once you register on APID, click here to go to the submission form. Manuscripts can be submitted until the deadline.n All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the email address:[email protected] for announcement on this website.n Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a Double-blind peer-review process. A guide for authors and other relevant information for the submission of manuscripts is available on the Instructions for Authors page.

n Participating journals:n

n

[foreach 176] n  2455-0337n [/foreach]

n

n

n

Abbrivation

n ijmetn

n

n

ISSN

n

n 2455-0337

n

n

Since

n

n

n

APC

u00a0 $

n

n

n

n[if 259 not_equal=””]

Published articles

View Published Paper[/if 259]n

n

n

n

n

n