How to secure Bluetooth-based pico networks

3Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We have examined Bluetooth-based Pico-network (Piconet) applications in wireless computing and cellular devices and found an extensive number of "unexpected abuses", where the security expectations of the device owner can be violated. We have studied the underlying causes of such problems and found that many products lack the controls to administer these devices securely. We also observed cases where explicit security claims from the Bluetooth protocol are not satisfied. We classify a number of abuses and security violations as Bluetooth protocol design flaws, application-layer implementation errors or simply pitfalls in the security management. Using this classification we define a core set of requirements that would improve security significantly. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Nilsson, D. K., Porras, P. A., & Jonsson, E. (2007). How to secure Bluetooth-based pico networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4680 LNCS, pp. 209–223). Springer Verlag. https://doi.org/10.1007/978-3-540-75101-4_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free