Security Threats Analysis in Bluetooth-Enabled Mobile Devices
2012 (English)In: International Journal of Network Security & Its Applications, ISSN 0975-2307, E-ISSN 0974-9330, Vol. 4, no 3, 41-56 p.Article in journal (Refereed) Published
Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popularway of wireless interconnections for exchanging information. The main goal of this paper is to analyzethe most critical Bluetooth attacks in real scenarios. In order to find out the major vulnerabilities inmodern Bluetooth-enabled mobile devices several attacks have performed successfully such as-Surveillance, Obfuscation, Sniffing, Unauthorized Direct Data Access (UDDA) and Man-in-the-MiddleAttack (MITM). To perform the testbed, several devices are used such as mobile phones, laptops,notebooks, wireless headsets, etc. and all the tests are carried out by pen-testing software like hcittml, braudit,spoafiooph, hridump, bluesnarfer, bluebugger and carwhisperer
Place, publisher, year, edition, pages
A I R C C Publishing Corporation , 2012. Vol. 4, no 3, 41-56 p.
IdentifiersURN: urn:nbn:se:kau:diva-26601DOI: 10.5121/ijnsa.2012.4303OAI: oai:DiVA.org:kau-26601DiVA: diva2:610707