A simple way to improve the security of Bluetooth devices
MetadataShow full item record
Copyright 2008 IEEE
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Bluetooth is a de facto standard feature in mobile devices such as smart phones, PDAs and similar devices. While this provides great convenience to the user, there are a number of security issues for which exploits are widely available. This fact, combined with the growing sophistication of devices, creates the potential for serious loss in the event of a security breach. This paper investigates the use of Bluetooth profiles by the public and finds that some potentially high-risk profiles are not widely used. A subsequent investigation of a number of devices determined that no way of configuring individual profiles was available. The paper concludes with a recommendation that devices allow users to configure individual Bluetooth profiles.
Showing items related by title, author, creator and subject.
Ghori, Khwaja Shan-ul-Hasan Dell, Peter (2007)Bluetooth, a wireless technology for building short-range communication links, poses a number of security risks, including disclosure of confidential data and unauthorised control of functions such as telephony and data ...
Abhayasinghe, Nimsiri; Murray, Iain (2013)Inertial Measurement Units (IMUs) are often used to measure motion parameters of human body in indoor/outdoor localization applications. Most of commercially available low-cost IMUs have limited number of sensors and are ...
Davies, N.; Friday, A.; Newman, Peter; Rutlidge, S.; Storz, O. (2009)An increasing trend in mobile and pervasive computing is the augmentation of everyday public spaces with local computation - leading to so called smart environments. However, there are no well accepted techniques for ...