Security Threats Analysis in Bluetooth-Enabled Mobile Devices
نویسنده
چکیده
Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular way of wireless interconnections for exchanging information. The main goal of this paper is to analyze the most critical Bluetooth attacks in real scenarios. In order to find out the major vulnerabilities in modern Bluetooth-enabled mobile devices several attacks have performed successfully such asSurveillance, Obfuscation, Sniffing, Unauthorized Direct Data Access (UDDA) and Man-in-the-Middle Attack (MITM). To perform the testbed, several devices are used such as mobile phones, laptops, notebooks, wireless headsets, etc. and all the tests are carried out by pen-testing software like hcittml, braudit, spoafiooph, hridump, bluesnarfer, bluebugger and carwhisperer.
منابع مشابه
Mobile Security Threats and Issues -- A Broad Overview of Mobile Device Security
Mobile security draws more attention when mobile devices gain its popularity. Malware such as viruses, botnets, worms become a concern of using mobile devices since they leak sensitive information stored at or transmitted by mobile devices. This paper investigates malware in different platforms of mobile devices including Bluetooth, iPhone OS, and Blackberry. Countermeasures of vulnerability an...
متن کاملThe Information Security of a Bluetooth-Enabled Handheld Device
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed for handheld devices such as PDAs, giving users a high level of usability and functionality. The goal of this paper is to present an information security evaluation of a Bluetooth enabled handheld device, such as a PD...
متن کاملBluetooth Security Threats
Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentia...
متن کاملSecuring Legacy Mobile Medical Devices
Millions of people use mobile medical devices—more every day. But our understanding of device security and privacy for such devices is incomplete. Man-inthe-middle attacks can be performed on typical Bluetooth-enabled mobile medical devices, compromising the privacy and safety of patients. In response, we developed the Personal Security Device, a portable device to improve security for mobile m...
متن کاملWorms in Cellular Networks
Synonyms Cellular Network Security Related concepts and keywords Cellular networks; MMS worms; Social Networking; Targeted Patching Definition Worms in cellular networks are malicious codes that can exploit social relationship among mobiles for propagating, and can be effectively contained by targeted patching. Background While the increased openness in cellular networks allows richer applicati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1206.1482 شماره
صفحات -
تاریخ انتشار 2012