B LUETOOTH S ECURITY T HREATS AND S OLUTIONS : A SURVEY Nateq Be - Nazir

نویسندگان

  • Be-Nazir Ibn Minar
  • Mohammed Tarique
چکیده

Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. The security issues of Bluetooth have been an active area of research for the last few years. This paper presents the vulnerabilities in the security protocols of this technology along with some past security threats and possible countermeasures as reported in the literatures which have been surveyed and summarized in this paper. It also presents some tips that end-users can implement immediately to become more cautious about their private information. Finally, the paper concludes with some recommendations for future security enhancements that can be implemented in the Bluetooth standard.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Competitive Advantage in Technology Intensive Industries

This chapter introduces the learner to the meaning of competitive advantage and posits that a firm’s strategy is defined as the managers’ theory about how to gain and sustain competitive advantage. The manner in which a firm creates its competitive advantage by creating more economic value than its rivals, and explains that profitability depends upon value, price, and costs is demonstrated. The...

متن کامل

Role of editors and journals in detecting and preventing scientific misconduct: strengths, weaknesses, opportunities, and threats.

Scientific journals have a central place in protecting research integrity because published articles are the most visible documentation of research. We used SWOT analysis to audit (S)trengths and (W)eaknesses as internal and (O)pportunities and (T)hreats as external factors affecting journals' responsibility in addressing research integrity issues. Strengths include editorial independence, auth...

متن کامل

Gains from diversification on convex combinations: A majorization and stochastic dominance approach

By incorporating both majorization theory and stochastic dominance theory, this paper presents a general theory and a unifying framework for determining the diversification preferences of risk-averse investors and conditions under which they would unanimously judge a particular asset to be superior. In particular, we develop a theory for comparing the preferences of different convex combination...

متن کامل

Improved immunogenicity of tetanus toxoid by Brucella abortus S19 LPS adjuvant.

BACKGROUND Adjuvants are used to increase the immunogenicity of new generation vaccines, especially those based on recombinant proteins. Despite immunostimulatory properties, the use of bacterial lipopolysaccharide (LPS) as an adjuvant has been hampered due to its toxicity and pyrogenicity. Brucella abortus LPS is less toxic and has no pyrogenic properties compared to LPS from other gram negati...

متن کامل

Steady electrodiffusion in hydrogel-colloid composites: macroscale properties from microscale electrokinetics.

A rigorous microscale electrokinetic model for hydrogel-colloid composites is adopted to compute macroscale profiles of electrolyte concentration, electrostatic potential, and hydrostatic pressure across membranes that separate electrolytes with different concentrations. The membranes are uncharged polymeric hydrogels in which charged spherical colloidal particles are immobilized and randomly d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012