International Journal of Scientific and Research Publications

IJSRP, Volume 6, Issue 4, April 2016 Edition [ISSN 2250-3153]


Bluetooth Security Analysis and Solution
      U.L.Muhammed Rijah, S.Mosharani, S.Amuthapriya, M.M.M Mufthas, Malikberdi Hezretov and Dhishan Dhammearatchi
Abstract: Bluetooth technology has become an essential part of this modern world where it provides a short distance wireless communication between devices and other network with low cost and low power making it convenient for the users. Bluetooth utilizes the standard 2.4GHz signal range. The security issues in Bluetooth network are malicious entities may gain unauthorized access, internal attacks may be possible via ad hoc transmissions, data may be extracted without any detections, viruses or other vulnerable attacks may corrupt data on the wireless devices, etc. These vulnerabilities in the security sectors are increasing which can be possibly dangerous to the privacy of a user’s personal information. To overcome these issues the network security in Bluetooth is introduced. There are many new risks created in Bluetooth network, a good security design is essential for it to be successful. This paper will be focused in what Bluetooth, the vulnerable risks associated with it, network securities related to the Bluetooth, how it works. Through this paper the solution for the above mentioned problems will be solved by giving some safety tips and the possible solutions like conducting seminars regarding the security issues and also doing some workshops for the user Majority of devices now communicates using this Bluetooth technology, the risk of the security issues are high. Due to the security issues, users will aware from Bluetooth attacks. User privacy protection methods for every new security as the device user’s personal information’s should be secured.

Reference this Research Paper (copy & paste below code):

U.L.Muhammed Rijah, S.Mosharani, S.Amuthapriya, M.M.M Mufthas, Malikberdi Hezretov and Dhishan Dhammearatchi (2018); Bluetooth Security Analysis and Solution; Int J Sci Res Publ 6(4) (ISSN: 2250-3153). http://www.ijsrp.org/research-paper-0416.php?rp=P525267
©️ Copyright 2011-2022 IJSRP - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.