Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security Threats Analysis in Bluetooth-Enabled Mobile Devices
Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
2012 (English)In: International Journal of Network Security & Its Applications, ISSN 0975-2307, E-ISSN 0974-9330, Vol. 4, no 3, 41-56 p.Article in journal (Refereed) Published
Abstract [en]

Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popularway of wireless interconnections for exchanging information. The main goal of this paper is to analyzethe most critical Bluetooth attacks in real scenarios. In order to find out the major vulnerabilities inmodern Bluetooth-enabled mobile devices several attacks have performed successfully such as-Surveillance, Obfuscation, Sniffing, Unauthorized Direct Data Access (UDDA) and Man-in-the-MiddleAttack (MITM). To perform the testbed, several devices are used such as mobile phones, laptops,notebooks, wireless headsets, etc. and all the tests are carried out by pen-testing software like hcittml, braudit,spoafiooph, hridump, bluesnarfer, bluebugger and carwhisperer

Place, publisher, year, edition, pages
A I R C C Publishing Corporation , 2012. Vol. 4, no 3, 41-56 p.
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kau:diva-26601DOI: 10.5121/ijnsa.2012.4303OAI: oai:DiVA.org:kau-26601DiVA: diva2:610707
Available from: 2013-03-12 Created: 2013-03-12 Last updated: 2017-12-06Bibliographically approved

Open Access in DiVA

fulltext(800 kB)124 downloads
File information
File name FULLTEXT01.pdfFile size 800 kBChecksum SHA-512
4e4d157ba039ef97a570c654f2df198d824ddf6701f7220d0ba8baf6d0d44e0d9e2623adc876e57f04842b640240249f7272e312aca6aa4b68e94380de459a7c
Type fulltextMimetype application/pdf

Other links

Publisher's full texthttp://airccse.org/journal/nsa/0512nsa03.pdf

Search in DiVA

By author/editor
Nasim, Robayet
By organisation
Department of Computer Science
In the same journal
International Journal of Network Security & Its Applications
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 124 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 207 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf