A Study on Bluetooth Security Connection and Attacks

Authors

  • M Dukitha Dept. of Master of Computer Applications, Er. Perumal Manimekalai College of Engineering, Hosur
  • D Harikrishnan Dept. of Master of Computer Applications, Er. Perumal Manimekalai College of Engineering, Hosur

Keywords:

Bluetoot, wifi-security, wireless protocal

Abstract

Increasing popularity of wireless communication systems, Bluetooth has become one of the most widely used short range wireless protocols. Unfortunately, due to the nature of wireless communication networks, Bluetooth has security vulnerabilities particularly through eavesdropping. Despite newer and more secure versions of Bluetooth being released, older versions such as Bluetooth four.0 and 4.1 are still widespread all over the world. After thoroughly exploring the current Bluetooth security model and reasons for potential vulnerability, this report performs a comparative analysis of different Bluetooth security attacks, extending them and applying them to readily accessible devices, and offering countermeasures. Based on our results and discussion, it's clear that Bluetooth is a widespread technology with significant security vulnerabilities in the real world today.

References

[1] Bluetooth.org. New Bluetooth Specifications Enable IP Connectivity and Deliver Industry-leading Privacy and Increased Speed. Technical report, Bluetooth Special Interest Group, 2014. http: //www.bluetooth.com/Pages/PressReleases-Detail.aspx?ItemID=220.

[2] Bluetooth.org. History of the Bluetooth Special Interest Group. Technical report, Bluetooth Special Interest Group, Available on February 2015. http://www.bluetooth.com/Pages/ History-of-Bluetooth.aspx.

[3] Bluetooth.org. Security, Bluetooth Smart (Low Energy). Technical report, Bluetooth Special Interest Group, 2015. https://developer. bluetooth.org/TechnologyOverview/ Pages/LE-Security.aspx.

[4] Bluetooth.org. The Low Energy Technology Behind Bluetooth Smart. Technical report, Bluetooth Special Interest Group, Available on February 2015. http://www.bluetooth.com/Pages/ low-energy-tech-info.aspx.

[5] J. P. Carles Gomez, Joaquim Oller. Overview and Evaluation of Bluetooth Low Energy: An Emerging LowPower Wireless Technology. Technical report, Universitat Politôlcnica de Catalunya/Fundaciøs i2Cat, August 2012. http://www.mdpi.com/1424- 8220/12/9/11734/htm.

[6] V. Gao. Everything that you always want to know about Bluetooth security in Bluetooth 4.1. Technical report, Bluetooth Special Interest Group, 2014. http: //blog.bluetooth.com/everythingyou-always-wanted-to-know-aboutbluetooth-security-in-bluetooth-4- 2/.

[7] R. Heydon. “Bluetooth Low Energy: the developer’s handbook”, Vol.0,2013.

[8] S. A. Joe Decuir. Bluetooth 4.0: Low Energy. Technical report, CSR plc,Available on February 2015. http://chapters.comsoc.org/ vancouver/BTLER3.pdf.

[9] A. West. Smartphone, the key for Bluetooth low energy technology. Technical report, IMS Research, Available on February 2015. http://www.bluetooth. com/Pages/Smartphones.aspx.

Downloads

Published

2025-11-25

How to Cite

[1]
M. Dukitha and D. Harikrishnan, “A Study on Bluetooth Security Connection and Attacks”, Int. J. Comp. Sci. Eng., vol. 7, no. 17, pp. 1–4, Nov. 2025.