Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Bluetooth Security Report
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Bluetooth Security

[attachment=56271]

Introduction

Bluetooth technology was developed to replace cumbersome wires in portable andpersonal electronic devices with radio frequency wireless communication. It has sincefound its way into numerous mobile applications as well as home and automobile use.However, as with all wireless technologies, security is of the utmost importance. Theprotection of a consumer’s valuable information and the contents of theircommunications have remained at the forefront of Bluetooth development.Unfortunately, security vulnerabilities have remained an increasing problem as attackershave developed more sophisticated ways of violating Bluetooth security, and the problemthreatening the Bluetooth community and the countermeasures being enacted to protectBluetooth users.

Overview of Bluetooth

Bluetooth is a wireless communication standard that was developed to revolutionize thesmall, personal, and portable electronic device market. It provides a protocol for lowpowerperipherals (cell phones, PDAs, mobile computers) to communicate with eachother over a small range. Each of these markets is represented by a major contributor tothe specification: Intel, 3COM, Ericsson, IBM, Motorola, Nokia, and Toshiba. Alongwith these major designers, over 1600 companies have since adopted the Bluetoothstandard.

Bluetooth Application Profiles

While Bluetooth is a Broad Communications standard, it isfocused on three distinct communication profiles: voice and data access points, peripheral interconnects, and only promises to become worse as Bluetooth devices permeate everyday life. I will present a brief overview of the Bluetooth standard, followed by an outline of Bluetooth’s security implementation. I will also examine some of the attacks currently
While Bluetooth is a broad communications standard, it is personal area networks (PAN).

Voice and Data Access Points

Voice and data access points were one of the first applications of Bluetooth technology.The goal was to allow wireless devices to communicate in order to allow them access to a broader wireless network.
Bluetooth security issues are an important factor with any Bluetooth device or system. As with any device these days that provide connectivity, security is a major problem. There are a number of Bluetooth security measures that can be incorporated into Bluetooth devices to avoid various security threats that may arise.

One of the main requirements for Bluetooth is that it should be easy to connect to other devices. However, Bluetooth security must be balanced with ease of use and anticipated Bluetooth security threats. Much work has been done regarding Bluetooth security, however, it remains an important agenda item so users can easily use their Bluetooth devices, keeping security threats to a minimum.

Bluetooth security is paramount as devices are susceptible to a variety of wireless and network attacks, including denial-of-service attacks, spontaneous eavesdropping, man-in-the-middle attacks, message modification and embezzlement resources.

Bluetooth security should also address more specific Bluetooth-related attacks that address known vulnerabilities in Bluetooth implementations and specifications. These can include attacks against improperly secured Bluetooth implementations that can provide attackers with unauthorized access.