25-08-2017, 09:32 PM
Bluetooth Security
Bluetooth Security.docx (Size: 14.05 KB / Downloads: 25)
Introduction
Bluetooth technology was developed to replace cumbersome wires in portable andpersonal electronic devices with radio frequency wireless communication. It has sincefound its way into numerous mobile applications as well as home and automobile use.However, as with all wireless technologies, security is of the utmost importance. Theprotection of a consumer’s valuable information and the contents of theircommunications have remained at the forefront of Bluetooth development.Unfortunately, security vulnerabilities have remained an increasing problem as attackershave developed more sophisticated ways of violating Bluetooth security, and the problemthreatening the Bluetooth community and the countermeasures being enacted to protectBluetooth users.
Overview of Bluetooth
Bluetooth is a wireless communication standard that was developed to revolutionize thesmall, personal, and portable electronic device market. It provides a protocol for lowpowerperipherals (cell phones, PDAs, mobile computers) to communicate with eachother over a small range. Each of these markets is represented by a major contributor tothe specification: Intel, 3COM, Ericsson, IBM, Motorola, Nokia, and Toshiba. Alongwith these major designers, over 1600 companies have since adopted the Bluetoothstandard.
Bluetooth Application Profiles
While Bluetooth is a Broad Communications standard, it isfocused on three distinct communication profiles: voice and data access points, peripheral interconnects, and only promises to become worse as Bluetooth devices permeate everyday life. I will present a brief overview of the Bluetooth standard, followed by an outline of Bluetooth’s security implementation. I will also examine some of the attacks currently
While Bluetooth is a broad communications standard, it is personal area networks (PAN).
Voice and Data Access Points
Voice and data access points were one of the first applications of Bluetooth technology.The goal was to allow wireless devices to communicate in order to allow them access to a broader wireless network.