International Journal of Information and Communication Technology Research

International Journal of Information and Communication Technology Research>> Call for Papers(CFP)>>Volume 7, Number 6, June 2017

International Journal of Information and Communication Technology Research


A Review on Key Agreement Protocols used in Bluetooth Standard and Security Vulnerabilities in Bluetooth Transmission

Full Text Pdf Pdf
Author(s) Trishna Panse, Vivek Kapoor, Prashant Panse
On Pages 315-318
Volume No. 2
Issue No. 3
Issue Date March, 2012
Publishing Date March, 2012
Keywords Bluetooth, Vulnerability, Eavesdropping, Piconet, Bluesnarf, Authentication, Encryption, E0 stream cipher



Abstract

This paper gives an overview of protocols used in Bluetooth communication and security weaknesses and vulnerabilities of the Bluetooth system. Now days, Bluetooth is a frequently used technique for data transmission. Bluetooth standard was come under IEEE 802.15. Its basic features are ad hoc in nature, very low power consumption and low cost. It operates on radio propagation with 2.4GHZ. Various types of security protocols are used to prevent eavesdropping and message interception but still some security weaknesses like no integrity check, man in middle attack, Bluesnarf attack and many more are present in Bluetooth transmission. This paper gives broad overview of the security flaws in Bluetooth.

Seperator
    Journal of Information and Communication Technology | Journal of Science and Technology     
Copyrights
2012 IRPN Publishers