Potential Bluetooth Vulnerabilities in Smartphones
نویسنده
چکیده
Smartphone vendors have been increasingly integrating Bluetooth technology into their devices to increase accessible and convenience for users. As the current inclination of integrating PDA and telephony increase, the likelihood of sensitive information being stored on such a device is also increased. Potential Bluetooth vulnerabilities could provide alternative means to compromise Bluetooth-enable smartphones, leading to severe data breaches. This paper gives an insight on potential security vulnerabilities in Bluetooth-enabled smartphones and how these vulnerabilities may affect smartphone users. This paper is discussed from the viewpoint of Bluetooth weaknesses and implementation flaws, which includes pairing, weak key storage, key disclosure, key database modification, unit key weaknesses, manipulating sent data, locating tracking, implementation flaws, disclosure of undiscoverable devices, denial of service, device-based authentication, and uncontrolled propagation of Bluetooth waves, as well as Blueprinting and relay attacks.
منابع مشابه
Bluetooth Command and Control channel
Bluetooth is popular technology for short-range communications and is incorporated in mobile devices such as smartphones, tablet computers and laptops. Vulnerabilities associated with Bluetooth technology led to improved security measures surrounding Bluetooth connections. Besides the improvement in security features, Bluetooth technology is still plagued by vulnerability exploits. This paper e...
متن کاملWhy Mobile-to-Mobile Wireless Malware Won't Cause a Storm
The enhanced capabilities of smartphones are creating the opportunity for new forms of malware to spread directly between mobile devices over short-range radio. This has been observed already in Bluetooth radios, and WiFi capabilities of smartphones provide an opportune new spreading vector. The increasing complexity of phone operating systems coupled with disclosed vulnerabilities suggest it i...
متن کاملA Survey on Malware Attacks on Smartphones
Today, smartphone has become a part of our everyday lives since they enable us to access variety of services in time . At present , the usage of these mobile services has significantly increased due to the different forms of connectivity provided by smartphones, such as GPRS, Bluetooth and Wi-Fi. At the same time , the number of vulnerabilities exploiting these services and communication channe...
متن کاملDesign, Implementation, and Evaluation of Bluetooth Security
Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. This article provides a study on the security issues behind the Bluetooth standard. After a overview of the general Bluetooth protocol, a security fr...
متن کاملA Survey of Security Vulnerabilities in Bluetooth Low Energy Beacons
There are currently 4 million Bluetooth Low Energy beacons, such as Apple’s iBeacons, deployed worldwide, with more being used in an increasingly wide variety of fields, from marketing to navigation. Yet, there is a lack of focus on the impact of security on beacon deployments. This report looks to capture an overview of current beacon deployments, the current vulnerabilities and risks present ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005