Bluetooth Security Analysis for Mobile Phones

被引:0
|
作者
Alfaiate, Joao [1 ]
Fonseca, Jose [1 ]
机构
[1] Guarda Polytech Inst, UDI Res Unit Inland Dev, Oporto, Portugal
关键词
Mobile Phones; Security; Hack; Attack; Bluetooth;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices are becoming more and more omnipresent due to their lightweight, small size and increasing performance. Almost every mobile device has Bluetooth (BT) capabilities and this powerful combination widely used in our daily life is coming to new environments like the car and the military industries. As any technology, BT has security issues that hackers have extensively exploited over the years, while users seem not to care too much. To raise the security awareness we present an analysis of BT attack methods and tools over time. We paid particular attention to the severity, possible targets and the ability to persist over new versions of BT. Results show that adversaries can take complete control of the victims' mobile device features if they forget to use simple safety measures like turning off the BT when not in use. To increase security we also propose the development of a novel BT Firewall.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Bluetooth Security Analysis for Mobile Phones
    Alfaiate, Joao
    Fonseca, Jose
    SISTEMAS Y TECNOLOGIAS DE INFORMACION, VOLS 1 AND 2, 2012, : 169 - 174
  • [2] Security Threats of Smart Phones and Bluetooth
    Loo, Alfred
    COMMUNICATIONS OF THE ACM, 2009, 52 (03) : 150 - 152
  • [3] Intrusion Detection in Bluetooth Enabled Mobile Phones
    Nair, Kishor Krishnan
    Helberg, Albert
    Van der Merwe, Johan
    2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
  • [4] Security Analysis of Mobile Phones Used as OTP Generators
    Raddum, Havard
    Nestas, Lars Hopland
    Hole, Kjell Jorgen
    INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 324 - 331
  • [5] Security in a mobile world - Is Bluetooth the answer?
    Barber, R
    COMPUTERS & SECURITY, 2000, 19 (04) : 321 - 325
  • [6] Security in a mobile world - is bluetooth the answer?
    Barber, R
    COMPUTERS & SECURITY, 2001, 20 (05) : 374 - 379
  • [7] Mobile phones security using biometrics
    Shabeer, H. Abdul
    Suganthi, P.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 270 - +
  • [8] Security of Mobile Phones and their Usage in Business
    Alqahtani, Abdullah Saleh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (11) : 17 - 32
  • [9] Bluetooth Based Collaborative Crowd Density Estimation with Mobile Phones
    Weppner, Jens
    Lukowicz, Paul
    2013 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2013, : 193 - 200
  • [10] Bluetooth in Mobile Telephony: Privacy and Security Issues
    Kostopoulos, George K.
    CREATING GLOBAL ECONOMIES THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: THEORY & PRACTICE, VOLS 1-3, 2009, : 1353 - 1356