Bluetooth Security Analysis for Mobile Phones

被引:0
|
作者
Alfaiate, Joao [1 ]
Fonseca, Jose [1 ]
机构
[1] Guarda Polytech Inst, UDI Res Unit Inland Dev, Oporto, Portugal
关键词
Mobile Phones; Security; Hack; Attack; Bluetooth;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices are becoming more and more omnipresent due to their lightweight, small size and increasing performance. Almost every mobile device has Bluetooth (BT) capabilities and this powerful combination widely used in our daily life is coming to new environments like the car and the military industries. As any technology, BT has security issues that hackers have extensively exploited over the years, while users seem not to care too much. To raise the security awareness we present an analysis of BT attack methods and tools over time. We paid particular attention to the severity, possible targets and the ability to persist over new versions of BT. Results show that adversaries can take complete control of the victims' mobile device features if they forget to use simple safety measures like turning off the BT when not in use. To increase security we also propose the development of a novel BT Firewall.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES
    Dmitrienko, Alexandra
    Hadzic, Zecir
    Loehr, Hans
    Winandy, Marcel
    Sadeghi, Ahmad-Reza
    HEALTHINF 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON HEALTH INFORMATICS, 2011, : 87 - 96
  • [22] Security Levels for Web Authentication Using Mobile Phones
    Vapen, Anna
    Shahmehri, Nahid
    PRIVACY AND IDENTITY MANAGEMENT FOR LIFE, 2011, 352 : 130 - 143
  • [23] A hybrid NFC-Bluetooth secure protocol for Credit Transfer among mobile phones
    Monteiro, David M.
    Rodrigues, Joel J. P. C.
    Lloret, Jaime
    Sendra, Sandra
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 325 - 337
  • [24] Dispatchable Indoor Location System for Mobile Phones based on a BlueTooth Low Energy Array
    Davids, Carol
    Davids, Cary
    Nandakumar, Bharat Ramaswamy
    Okhandiar, Neilabh
    Rois, Francisco
    Ljazouli, Chakib
    Murillo, Adrian Calle
    2017 PRINCIPLES, SYSTEMS AND APPLICATIONS OF IP TELECOMMUNICATIONS (IPTCOMM), 2017,
  • [25] Exploiting Bluetooth on Android Mobile Devices for Home Security Application
    Potts, Josh
    Sukittanon, Somsak
    2012 PROCEEDINGS OF IEEE SOUTHEASTCON, 2012,
  • [26] Software security aspects of Java-based mobile phones
    Center for Computing Technologies , Universität Bremen, Bibliothekstr. 1, 28359 Bremen, Germany
    不详
    Proc ACM Symp Appl Computing, (1494-1501):
  • [27] Survey Findings towards Awareness of Mobile Phones' Security Issues
    Androulidakis, Iosif I.
    Papapetros, Dimitrios
    PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON DATA NETWORKS, COMMUNICATIONS, COMPUTERS (DNCOCO '08): RECENT ADVANCES IN DATA NETWORKS, COMMUNICATIONS, COMPUTERS, 2008, : 130 - +
  • [28] A Method to Improve the Security of Screen Lock for Android Mobile Phones
    Zhang, Ji
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1507 - 1510
  • [29] Design and Implementation of Security Camera Control Application for Mobile Phones
    Kato, Takeshi
    Osano, Tomoyuki
    Ishikawa, Norihiro
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 555 - 559
  • [30] Surveying users' practices regarding mobile phones' security features
    Androulidakis, Iosif
    Christou, Vasilios
    Bardis, Nikolaos G.
    Stilios, Ioannis
    COMPUTING AND COMPUTATIONAL INTELLIGENCE, PROCEEDINGS, 2009, : 25 - +