Security Threats Analysis in Bluetooth-Enabled Mobile Devices

  • Nasim R
N/ACitations
Citations of this article
20Readers
Mendeley users who have this article in their library.

Abstract

Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular way of wireless interconnections for exchanging information. The main goal of this paper is to analyze the most critical Bluetooth attacks in real scenarios. In order to find out the major vulnerabilities in modern Bluetooth-enabled mobile devices several attacks have performed successfully such as- Surveillance, Obfuscation, Sniffing, Unauthorized Direct Data Access (UDDA) and Man-in-the-Middle Attack (MITM). To perform the testbed, several devices are used such as mobile phones, laptops, notebooks, wireless headsets, etc. and all the tests are carried out by pen-testing software like hcittml, br- audit, spoafiooph, hridump, bluesnarfer, bluebugger and carwhisperer.

Cite

CITATION STYLE

APA

Nasim, R. (2012). Security Threats Analysis in Bluetooth-Enabled Mobile Devices. International Journal of Network Security & Its Applications, 4(3), 41–56. https://doi.org/10.5121/ijnsa.2012.4303

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free