A Study on Bluetooth Security Connection and Attacks
Keywords:
Bluetoot, wifi-security, wireless protocalAbstract
Increasing popularity of wireless communication systems, Bluetooth has become one of the most widely used short range wireless protocols. Unfortunately, due to the nature of wireless communication networks, Bluetooth has security vulnerabilities particularly through eavesdropping. Despite newer and more secure versions of Bluetooth being released, older versions such as Bluetooth four.0 and 4.1 are still widespread all over the world. After thoroughly exploring the current Bluetooth security model and reasons for potential vulnerability, this report performs a comparative analysis of different Bluetooth security attacks, extending them and applying them to readily accessible devices, and offering countermeasures. Based on our results and discussion, it's clear that Bluetooth is a widespread technology with significant security vulnerabilities in the real world today.
References
[1] Bluetooth.org. New Bluetooth Specifications Enable IP Connectivity and Deliver Industry-leading Privacy and Increased Speed. Technical report, Bluetooth Special Interest Group, 2014. http: //www.bluetooth.com/Pages/PressReleases-Detail.aspx?ItemID=220.
[2] Bluetooth.org. History of the Bluetooth Special Interest Group. Technical report, Bluetooth Special Interest Group, Available on February 2015. http://www.bluetooth.com/Pages/ History-of-Bluetooth.aspx.
[3] Bluetooth.org. Security, Bluetooth Smart (Low Energy). Technical report, Bluetooth Special Interest Group, 2015. https://developer. bluetooth.org/TechnologyOverview/ Pages/LE-Security.aspx.
[4] Bluetooth.org. The Low Energy Technology Behind Bluetooth Smart. Technical report, Bluetooth Special Interest Group, Available on February 2015. http://www.bluetooth.com/Pages/ low-energy-tech-info.aspx.
[5] J. P. Carles Gomez, Joaquim Oller. Overview and Evaluation of Bluetooth Low Energy: An Emerging LowPower Wireless Technology. Technical report, Universitat Politôlcnica de Catalunya/Fundaciøs i2Cat, August 2012. http://www.mdpi.com/1424- 8220/12/9/11734/htm.
[6] V. Gao. Everything that you always want to know about Bluetooth security in Bluetooth 4.1. Technical report, Bluetooth Special Interest Group, 2014. http: //blog.bluetooth.com/everythingyou-always-wanted-to-know-aboutbluetooth-security-in-bluetooth-4- 2/.
[7] R. Heydon. “Bluetooth Low Energy: the developer’s handbook”, Vol.0,2013.
[8] S. A. Joe Decuir. Bluetooth 4.0: Low Energy. Technical report, CSR plc,Available on February 2015. http://chapters.comsoc.org/ vancouver/BTLER3.pdf.
[9] A. West. Smartphone, the key for Bluetooth low energy technology. Technical report, IMS Research, Available on February 2015. http://www.bluetooth. com/Pages/Smartphones.aspx.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
