Title : 
Bluetooth security analysis for mobile phones
         
        
            Author : 
Alfaiate, João ; Fonseca, José
         
        
            Author_Institution : 
UDI - Res. Unit for Inland Dev., Guarda Polytech. Inst., Guarda, Portugal
         
        
        
        
        
        
            Abstract : 
Mobile devices are becoming more and more omnipresent due to their lightweight, small size and increasing performance. Almost every mobile device has Bluetooth (BT) capabilities and this powerful combination widely used in our daily life is coming to new environments like the car and the military industries. As any technology, BT has security issues that hackers have extensively exploited over the years, while users seem not to care too much. To raise the security awareness we present an analysis of BT attack methods and tools over time. We paid particular attention to the severity, possible targets and the ability to persist over new versions of BT. Results show that adversaries can take complete control of the victims´ mobile device features if they forget to use simple safety measures like turning off the BT when not in use. To increase security we also propose the development of a novel BT Firewall.
         
        
            Keywords : 
Bluetooth; authorisation; mobile computing; mobile radio; telecommunication security; BT attack method; BT firewall; Bluetooth security analysis; mobile device; mobile phones; Bluetooth; Fires; Mobile communication; Mobile handsets; Performance evaluation; Protocols; Security; Attack; Bluetooth; Hack; Mobile Phones; Security;
         
        
        
        
            Conference_Titel : 
Information Systems and Technologies (CISTI), 2012 7th Iberian Conference on
         
        
            Conference_Location : 
Madrid
         
        
        
            Print_ISBN : 
978-1-4673-2843-2