securing a bluetooth device

Dhanashri D. Dhokate1,Milind C. Butale,Babasaheb S. Patil

Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

ISSN: 2320-7248          Impact Factor:1.8         Volume:2         Issue:1         Year: 09 April,2015         Pages:125-131

International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

Abstract

The purpose of this study is to introduce the various security levels for connecting two Bluetooth devices. Bluetooth devices form Scatter net network for personal area networking. These Scatternet concepts and security issues related to Scatternet are explained here. This article is based on study of different aspects of Bluetooth security. Various weaknesses involved in Bluetooth transfer between devices and steps to overcome these weaknesses are also included. The purpose of this document is to let the reader’s know the basic technology used for data transfer through Bluetooth. The aim of our study is to evaluate security threats in Bluetooth-enabled systems.

Kewords

Bluetooth, Bluetooth security, Radio Frequency, Scatternet, security analysis.

Reference

[1]Keijo M.J. Haataja- Detailed descriptions of new proof-of-concept Bluetooth security analysis tools and new security attacks ; Report B/2005/1 [2] Karen Scarfone John Padgette– Guide to Bluetooth Security Recommendations of the National Institute of Standards and Technology ; NIST Special Publication 800-121 September 2008 [3] Keijo Haataja- Security Threats and Countermeasures in Bluetooth-Enabled Systems ; Kuopio University Publications H. Business and Information Technology 13. 2009 [4] Karl E Persson and D. Manivannan-Secure Connections in Bluetooth Scatternets ; Computer Science Department University of Kentucky 2002 [5] Christian Gehrmann- Bluetooth™ Security White Paper; Bluetooth SIG Security Expert Group 2002 .