An Investigation of Bluetooth Security Threats

@article{Tan2011AnIO,
  title={An Investigation of Bluetooth Security Threats},
  author={Margaret Tan and Kathrine Aguilar Masagca},
  journal={2011 International Conference on Information Science and Applications},
  year={2011},
  pages={1-7}
}
Bluetooth, which offers users the mobility to convenient, low-cost, short-ranged connections with up to seven other Bluetooth-enabled devices, has been widely adopted especially by young adults. However, Bluetooth-enabled networks have similar security weaknesses as any other digital networks. Instilling security awareness and implementing preventive measures, responsibilities of both the device manufacturers and the users, are essential to prevent harmful security breaches that may affect data… CONTINUE READING
3 Citations
24 References
Similar Papers

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 24 references

Mobile security risks: Ever evolving

  • B. Potter
  • Network Security, vol. 2007, no. 8, pp. 19-20…
  • 2007
Highly Influential
3 Excerpts

Bluetooth attacks

  • B. Haines
  • Seven Deadliest Wireless Technologies Attacks, B…
  • 2010

Dec.). Mobile & smart device security survey 2010: Concern grown as vulnerable devices proliferate, smartphones are the tip of the iceberg

  • K. Stammberger
  • 2010
1 Excerpt

Hypercom introduces next generation mobile payment product : Sets new benchmark for high - performance , mobile payment systems geared for the future

  • K. Karppinen
  • 2010

Nov.). Mobile security report

  • McAfee, Inc
  • 2010
2 Excerpts

Similar Papers

Loading similar papers…