Skip to main content

Part of the book series: Springer Series in Wireless Technology ((SSWT))

Abstract

While living in this smart and intelligent world, many times, consumer connects to some or the other device through Bluetooth. This includes HVAC system, televisions, smart phones, fitness trackers, connected cars, Internet of things, connection of wireless mouse to laptop, wireless headphone connection to mobile device, etc. Wirelessly connected gadgets have become integral part of human life. A mobile malware Lasco. A started targeting to mobile devices in 2005. It uses Symbian operating system and uses Bluetooth technology to replicate itself and also gets spread to other Bluetooth enabled nearby devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • CYWARE (2019) malware and Vulnerabilities Blog on Latest Bluetooth hacking techniques expose new attack vectors for hackers, 2019. https://cyware.com/news/latest-bluetooth-hacking-techniques-expose-new-attack-vectors-for-hackers-a16cfb5e

  • Doon JE (2014) Thieves steal $2 million from gas station ATMs using Bluetooth skimmers. TechWorld News, 23 Jan 2014. http://www.techworld.com/news/security/thieves-steal-2-million-from-gas-station-atms-using-bluetooth-skimmers-3498684/

  • Haataja K (2009) Security threats and countermeasures bluetooth-enabled systems, Feb 2009

    Google Scholar 

  • Hassan SS, Bibon SD, Hossain MS, Atiquzzaman M (2018) Security threats in bluetooth technology. Science Direct J Comput Secur 74:308–322

    Article  Google Scholar 

  • Henda NB (2014) Generic and efficient attacker models in SPIN, SPIN’14, July 21–23, San Jose, USA, 2014

    Google Scholar 

  • Hossain H, Kabir U, Rahman S (2011) Modified approach to RFCOMM implementation to protect bluetooth technology from Bluebug attack, IJCIT, 2011

    Google Scholar 

  • Latchmanan S, Parveen S (2018) Applicability of RC4 algorithm in Bluetooth data encryption method for achieving better energy efficiency of mobile devices. In: Proceedings of conference on informatics, Kuala Lumpur, Malaysia. repository.um.edu.my/17597/1/Informatics_003.pdf

  • Minar NBNI, Tarique M (2012) Bluetooth security threats and solutions: a survey. Int J Distrib Parallel Syst (IJDPS) 3(1):127

    Article  Google Scholar 

  • Mora-Afonso V, Caballero-Gil P, Molina-Gil J (2013) Strong authentication on smart wireless devices. In: Second international IEEE conference on future generation communication technology (FGCT), 2013, pp 137–142

    Google Scholar 

  • Patheja PS, Woo AA, Nagwanshi S (2011) A hybrid encryption technique to secure bluetooth communication. In: International conference on computer communication and networks CSI-COMNET-2011

    Google Scholar 

  • Rajput BS, Gupta P, Yadav S (2012) An integrated encryption scheme used in Bluetooth communication mechanism. Int J Comput Technol Electron Eng (IJCTEE) 1(2):68

    Google Scholar 

  • Reddy KR, Raju GS (2013) A new design of algorithm for enhancing security in bluetooth communication with triple DES. Int J Sci Res (IJSR), India 2(2)

    Google Scholar 

  • Sharma T (2016) Attacks on Bluetooth devices. Wegilant Net Solutions Pvt. Ltd

    Google Scholar 

  • Shrivastava M, Murarka S, Narware S (2012) Performance analysis of quadratic prime code for modified Bluetooth FH communication system. Int J Emerg Technol Adv Eng 2(1)

    Google Scholar 

  • Vishwakarma P, Patel B (Aug, 2011) Bluetooth security–secure data transfer over Bluetooth. IJCSMS Int J Comput Sci Manag Stud 11(02)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramjee Prasad .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Prasad, R., Rohokale, V. (2020). Bluetooth Communication. In: Cyber Security: The Lifeline of Information and Communication Technology. Springer Series in Wireless Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-31703-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-31703-4_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-31702-7

  • Online ISBN: 978-3-030-31703-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics