Title :
Bluetooth Security in Wearable Computing Applications
Author :
Bouhenguel, Redjem ; Mahgoub, Imad ; Ilyas, Mohammad
Author_Institution :
Comput. Sci. & Eng. Dept., Florida Atlantic Univ. Boca Raton Florida, Boca Raton, FL
Abstract :
Advances in wireless sensor networking technologies have been extended to wearable computing systems and opened a plethora of applications and opportunities in the development and integration of pervasive Bluetooth Technologies with the abundance of existing specialized technologies in monitoring, data collection, and real-time analysis and reporting. Although the Bluetooth framework is acceptably secure, there are still a number of weaknesses in the Bluetooth technology. The nature of the wireless ad hoc and the device addressing schemes still make the Bluetooth protocol vulnerable to possible attacks and risks. This paper analyzes some of the vulnerabilities of Bluetooth architecture to possible attacks and risks and the best practices and countermeasures needed to thwart these attacks that target Bluetooth devices and their attached networks. It concentrates on Bluetooth technology security issues and challenges that face wireless computing systems.
Keywords :
Bluetooth; wearable computers; wireless sensor networks; Bluetooth security; wearable computing systems; wireless sensor networks; Bluetooth; Communication system security; Data security; Monitoring; Real time systems; Sensor systems and applications; Wearable computers; Wearable sensors; Wireless application protocol; Wireless sensor networks; Authentication; Bluetooth Security; Encryption; Wearable Computing; wireless sensor networking;
Conference_Titel :
High Capacity Optical Networks and Enabling Technologies, 2008. HONET 2008. International Symposium on
Conference_Location :
Penang
Print_ISBN :
978-1-4244-2960-8
Electronic_ISBN :
978-1-4244-2961-5
DOI :
10.1109/HONET.2008.4810232