Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

ANALYSING BLUETOOTH SECURITY SYSTEM

Author : Baibaswata Mohapatra 1

Date of Publication :15th June 2017

Abstract: Bluetooth is considered to be an essential part in the modern era which provides a short distance wireless communication between multiple devices and networks that consumes low power which makes it convenient for users. The technology uses the free frequency of 2.4 GHz signal range. The challenges in Bluetooth network are mischievous data can be accessed without any authorization, internal attacks can be carried out using ad hoc communication technology, data can be extracted without any virus or attacks. The attacks in the security system are increasing which could be dangerous and could hamper the privacy of the personal data of the user. To overcome the issues of network security in Bluetooth is introduced. There are numerous risks that are created using the Bluetooth, susceptible risks is associated, network securities related to the Bluetooth. The paper focuses on the solution of the above mentioned problem that can be solved by giving safety tips and solutions like conducting seminars, workshops, etc. Due to the increasing security issues, users will be aware of Bluetooth attacks.

Reference :

    1. Bluetooth Special Interest Group (SIG), “Bluetooth Core Specification Version 5.0,” Bluetooth Core Specif. Version 4.2, 2016, doi: 10.4049/jimmunol.1302359.
    2. J. Decuir, “Introducing bluetooth smart: Part 1: A look at both classic and new technologies,” IEEE Consumer Electronics Magazine. 2014, doi: 10.1109/MCE.2013.2284932
    3. R. Mitchell and I. R. Chen, “A survey of intrusion detection in wireless network applications,” Computer Communications. 2014, doi: 10.1016/j.comcom.2014.01.012.
    4. I. Howitt and G. Jore A., “IEEE 802.15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs),” Wirel. Commun. Netw., 2011, doi: 10.1109/IEEESTD.2011.6012487.
    5. M. Verma, S. Singh, and B. Kaur, “An Overview of Bluetooth Technology and its Communication Applications,” Int. J. Curr. Eng. Technol. E Int. J. Curr. Eng. Technol., 2015.
    6. W. Ren and Z. Miao, “A hybrid encryption algorithm based on DES and RSA in Bluetooth communication,” 2010, doi: 10.1109/WMSVM.2010.48.
    7. M. Duarte, C. Dick, and A. Sabharwal, “Experiment-driven characterization of full-duplex wireless systems,” IEEE Trans. Wirel. Commun., 2012, doi: 10.1109/TWC.2012.102612.111278.
    8. M. Denis, C. Zena, and T. Hayajneh, “Penetration testing: Concepts, attack methods, and defense strategies,” 2016, doi: 10.1109/LISAT.2016.7494156.
    9. M. Ghallali, D. El Ouadghiri, M. Essaaidi, and M. Boulmalf, “Mobile phones security: The spread of malware via MMS and Bluetooth, prevention methods,” 2011, doi: 10.1145/2095697.2095750.
    10. M. La Polla, F. Martinelli, and D. Sgandurra, “A survey on security for mobile devices,” IEEE Commun. Surv. Tutorials, 2013, doi: 10.1109/SURV.2012.013012.00028
    11. D. Mani and A. Mahendran, “DDOS detection and mitigation for managed security of cloud resources,” Int. J. Pharm. Technol., 2016.

    1. Bluetooth Special Interest Group (SIG), ‘Bluetooth Core Specification Version 5.0’, 2016.
    2. J. Decuir, ‘Introducing bluetooth smart: Part 1: A look at both classic and new technologies’, IEEE Consumer Electronics Magazine. 2014.
    3. R. Mitchell and I. R. Chen, ‘A survey of intrusion detection in wireless network applications’, Computer Communications. 2014.
    4. I. Howitt and G. Jore A., ‘IEEE 802.15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)’, Wirel. Commun. Netw., 2011.
    5. M. Verma, S. Singh, and B. Kaur, ‘An Overview of Bluetooth Technology and its Communication Applications’, Int. J. Curr. Eng. Technol. E Int. J. Curr. Eng. Technol., 2015.
    6. W. Ren and Z. Miao, ‘A hybrid encryption algorithm based on DES and RSA in Bluetooth communication’, in Proceedings - 2010 2nd International Conference on Modeling, Simulation, and Visualization Methods, WMSVM 2010, 2010.
    7. M. Duarte, C. Dick, and A. Sabharwal, ‘Experiment-driven characterization of fullduplex wireless systems’, IEEE Trans. Wirel. Commun., 2012.
    8. M. Denis, C. Zena, and T. Hayajneh, ‘Penetration testing: Concepts, attack methods, and defense strategies’, in 2016 IEEE Long Island Systems, Applications and Technology Conference, LISAT 2016, 2016.
    9. M. A. Albahar, O. Olawumi, K. Haataja, and P. Toivanen, ‘Novel Hybrid Encryption Algorithm Based on Aes, RSA, and Twofish for Bluetooth Encryption’, J. Inf. Secur., vol. 09, no. 02, pp. 168–176, 2018.
    10. M. Ghallali, D. El Ouadghiri, M. Essaaidi, and M. Boulmalf, ‘Mobile phones security: The spread of malware via MMS and Bluetooth, prevention methods’, in ACM International Conference Proceeding Series, 2011.
    11. M. La Polla, F. Martinelli, and D. Sgandurra, ‘A survey on security for mobile devices’, IEEE Commun. Surv. Tutorials, 2013
    12. D. Mani and A. Mahendran, ‘DDOS detection and mitigation for managed security of cloud resources’, Int. J. Pharm. Technol., 2016.
    13. Nisha Pandey, B. S. Chowdhary , Bhagwan Das , D. M. Akbar Husain , Vishal Jain , Tanesh Kumar, “Design of Data Processing Device on Low Power SPARTAN6 FPGA”, International Journal of Control and Automation (IJCA).
    14. Sujeet Pandey, Puneet Tomar, Lubna Luxmi Dhirani, D. M. Akbar Hussain, Vishal Jain, Nisha Pandey, “Design of Energy Efficient Sinusoidal PWM Waveform Generator on FPGA”, International Journal of Signal Processing, Image Processing and Pattern Recognition (IJSIP), Vol. 10 No. 10, October, 2017, page no. 49-58 having ISSN No. 2005- 4254.
    15. B.Powmeya , Nikita Mary Ablett ,V.Mohanapriya,S.Balamurugan,”A n Object Oriented approach to Model the secure Health care Database systems,”In proceedings of International conference on computer , communication & signal processing(IC3 SP)in association with IETE students forum and the society of digital information and wireless communication,SDIWC,2011,pp.2-3, 2011

Recent Article