Ulster University Logo

Case Study on the Bluetooth Vulnerabilities in Mobile Devices

solon, A, Callaghan, MJ, Harkin, Jim and McGinnity, TM (2006) Case Study on the Bluetooth Vulnerabilities in Mobile Devices. IJCSNS International Journal of Computer Science and Network Security, 6 (4). pp. 125-129. [Journal article]

[img] PDF - Accepted Version
263kB

URL: http://ijcsns.org/

Abstract

As the widespread use and acceptance of Bluetooth continues concerns are being raised related to security vulnerabilities and privacy issues inherent in the use of this technology. Inadequate device resources and lack of user awareness has compounded this issue where the emphasis on design constraints, functionality and ease of use sometimes outweigh security concerns. Recently some concerns have being highlighted relating to the possible security vulnerabilities in commonly used devices, and also the possibility of the imperceptible tracking of device users through the use of distributed and connected Bluetooth sensor nodes. This paper discusses some of these issues and highlights a number of vulnerabilities in the current generation of Bluetooth enabled devices. In particular, the current methods being used to exploit these vulnerabilities are discussed and the results from a case study are presented which identify the percentage of popular devices susceptible to this type of misuse.

Item Type:Journal article
Keywords:Bluetooth Security, Bluesnarfing, Bluebug, Privacy.
Faculties and Schools:Faculty of Computing & Engineering
Faculty of Computing & Engineering > School of Computing and Intelligent Systems
Research Institutes and Groups:Computer Science Research Institute > Intelligent Systems Research Centre
Computer Science Research Institute
ID Code:29508
Deposited By: Mr Michael Callaghan
Deposited On:26 May 2014 11:52
Last Modified:17 Oct 2017 16:14

Repository Staff Only: item control page