Bluetooth Security in Wearable Computing Applications

  title={Bluetooth Security in Wearable Computing Applications},
  author={Redjem Bouhenguel and Imad Mahgoub and Mohammad Ilyas},
  journal={2008 International Symposium on High Capacity Optical Networks and Enabling Technologies},
Advances in wireless sensor networking technologies have been extended to wearable computing systems and opened a plethora of applications and opportunities in the development and integration of pervasive Bluetooth Technologies with the abundance of existing specialized technologies in monitoring, data collection, and real-time analysis and reporting. Although the Bluetooth framework is acceptably secure, there are still a number of weaknesses in the Bluetooth technology. The nature of the… CONTINUE READING
Highly Cited
This paper has 28 citations. REVIEW CITATIONS
17 Citations
1 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 17 extracted citations


Publications referenced by this paper.

Bluetooth SIG, Specification of the Bluetooth System: PINs and password

  • P. Bonato
  • Core, Version 2.1,
  • 2007
Highly Influential
3 Excerpts

Similar Papers

Loading similar papers…