DocumentCode
566356
Title
Bluetooth security analysis for mobile phones
Author
Alfaiate, João ; Fonseca, José
Author_Institution
UDI - Res. Unit for Inland Dev., Guarda Polytech. Inst., Guarda, Portugal
fYear
2012
fDate
20-23 June 2012
Firstpage
1
Lastpage
6
Abstract
Mobile devices are becoming more and more omnipresent due to their lightweight, small size and increasing performance. Almost every mobile device has Bluetooth (BT) capabilities and this powerful combination widely used in our daily life is coming to new environments like the car and the military industries. As any technology, BT has security issues that hackers have extensively exploited over the years, while users seem not to care too much. To raise the security awareness we present an analysis of BT attack methods and tools over time. We paid particular attention to the severity, possible targets and the ability to persist over new versions of BT. Results show that adversaries can take complete control of the victims´ mobile device features if they forget to use simple safety measures like turning off the BT when not in use. To increase security we also propose the development of a novel BT Firewall.
Keywords
Bluetooth; authorisation; mobile computing; mobile radio; telecommunication security; BT attack method; BT firewall; Bluetooth security analysis; mobile device; mobile phones; Bluetooth; Fires; Mobile communication; Mobile handsets; Performance evaluation; Protocols; Security; Attack; Bluetooth; Hack; Mobile Phones; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Systems and Technologies (CISTI), 2012 7th Iberian Conference on
Conference_Location
Madrid
ISSN
2166-0727
Print_ISBN
978-1-4673-2843-2
Type
conf
Filename
6263117
Link To Document