Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures /
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literatur...
| Main Authors: | , , , |
|---|---|
| Corporate Author: | |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2013.
|
| Series: | SpringerBriefs in Computer Science,
|
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
| Summary: | Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices. |
|---|---|
| Physical Description: | VII, 93 p. 31 illus. online resource. |
| ISBN: | 9783642406461 |
| ISSN: | 2191-5768 |