Corpus ID: 18048223

Security in Bluetooth , WLAN and IrDA : a comparison

@inproceedings{Haataja2007SecurityIB,
  title={Security in Bluetooth , WLAN and IrDA : a comparison},
  author={K. Haataja},
  year={2007}
}
  • K. Haataja
  • Published 2007
  • Excluding mobile phone related data transfer, there are three popular wireless data transfer technologies: Bluetooth, WLAN and IrDA. In this report we compare the security of these three technologies. 
    5 Citations

    Figures and Tables from this paper.

    References

    SHOWING 1-10 OF 14 REFERENCES
    Hardware Security Concept for Spontaneous Network Integration of Mobile Devices
    • 13
    • PDF
    IrDA and Bluetooth: A Complementary Comparison
    • 15
    • PDF
    A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
    • 137
    • PDF
    Detailed descriptions of new proof-of-concept Bluetooth security analysis tools and new security attacks
    • 6
    • PDF
    Bluetooth Network Vulnerability to Disclosure, Integrity and Denialof-Service Attacks. Proceedings of the Annual Finnish Data Processing Week at the University of Petrozavodsk (FDPW’2005)
    • Advances in Methods of Modern Information Technology,
    • 2006
    EVALUATION OF THE CURRENT STATE OF BLUETOOTH SECURITY
    • 3
    IPComm2004 – Mobile user security
    • MediaLive International & Core Competence Inc., Wellesley Information Services,
    • 2004
    Infrared Data Association , IrDA specifications . Infrared Data Association , technical specifications , 1993 - 2005
      J . Haataja , Bluetooth Security Threats and Possible Countermeasures
      • ceedings of the Annual Finnish Data Processing Week at the University of Petrozavodsk ( FDPW ’ 2004 ) , Advances in Methods of Modern Information Technology
      • 2005