Abstract
While living in this smart and intelligent world, many times, consumer connects to some or the other device through Bluetooth. This includes HVAC system, televisions, smart phones, fitness trackers, connected cars, Internet of things, connection of wireless mouse to laptop, wireless headphone connection to mobile device, etc. Wirelessly connected gadgets have become integral part of human life. A mobile malware Lasco. A started targeting to mobile devices in 2005. It uses Symbian operating system and uses Bluetooth technology to replicate itself and also gets spread to other Bluetooth enabled nearby devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
CYWARE (2019) malware and Vulnerabilities Blog on Latest Bluetooth hacking techniques expose new attack vectors for hackers, 2019. https://cyware.com/news/latest-bluetooth-hacking-techniques-expose-new-attack-vectors-for-hackers-a16cfb5e
Doon JE (2014) Thieves steal $2 million from gas station ATMs using Bluetooth skimmers. TechWorld News, 23 Jan 2014. http://www.techworld.com/news/security/thieves-steal-2-million-from-gas-station-atms-using-bluetooth-skimmers-3498684/
Haataja K (2009) Security threats and countermeasures bluetooth-enabled systems, Feb 2009
Hassan SS, Bibon SD, Hossain MS, Atiquzzaman M (2018) Security threats in bluetooth technology. Science Direct J Comput Secur 74:308–322
Henda NB (2014) Generic and efficient attacker models in SPIN, SPIN’14, July 21–23, San Jose, USA, 2014
Hossain H, Kabir U, Rahman S (2011) Modified approach to RFCOMM implementation to protect bluetooth technology from Bluebug attack, IJCIT, 2011
Latchmanan S, Parveen S (2018) Applicability of RC4 algorithm in Bluetooth data encryption method for achieving better energy efficiency of mobile devices. In: Proceedings of conference on informatics, Kuala Lumpur, Malaysia. repository.um.edu.my/17597/1/Informatics_003.pdf
Minar NBNI, Tarique M (2012) Bluetooth security threats and solutions: a survey. Int J Distrib Parallel Syst (IJDPS) 3(1):127
Mora-Afonso V, Caballero-Gil P, Molina-Gil J (2013) Strong authentication on smart wireless devices. In: Second international IEEE conference on future generation communication technology (FGCT), 2013, pp 137–142
Patheja PS, Woo AA, Nagwanshi S (2011) A hybrid encryption technique to secure bluetooth communication. In: International conference on computer communication and networks CSI-COMNET-2011
Rajput BS, Gupta P, Yadav S (2012) An integrated encryption scheme used in Bluetooth communication mechanism. Int J Comput Technol Electron Eng (IJCTEE) 1(2):68
Reddy KR, Raju GS (2013) A new design of algorithm for enhancing security in bluetooth communication with triple DES. Int J Sci Res (IJSR), India 2(2)
Sharma T (2016) Attacks on Bluetooth devices. Wegilant Net Solutions Pvt. Ltd
Shrivastava M, Murarka S, Narware S (2012) Performance analysis of quadratic prime code for modified Bluetooth FH communication system. Int J Emerg Technol Adv Eng 2(1)
Vishwakarma P, Patel B (Aug, 2011) Bluetooth security–secure data transfer over Bluetooth. IJCSMS Int J Comput Sci Manag Stud 11(02)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Prasad, R., Rohokale, V. (2020). Bluetooth Communication. In: Cyber Security: The Lifeline of Information and Communication Technology. Springer Series in Wireless Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-31703-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-31703-4_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-31702-7
Online ISBN: 978-3-030-31703-4
eBook Packages: EngineeringEngineering (R0)