logo

Bluetooth Security

   

Added on  2023-06-03

14 Pages3034 Words61 Views
Running head: BLUETOOTH SECURITY
Bluetooth Security
Name of the Student:
Name of the University:
Author Note:

1BLUETOOTH SECURITY
Abstract
The aim of the study is to discuss various aspects related to the security of Bluetooth technology
and its usage in various devices. The Bluetooth technology is a wireless technology that makes
use of the radio waves instead of the wires or cables. This technology has benefitted the humans
as it freed them from then hassles of wires and cables. However, this Bluetooth technology is
associated with various threats and vulnerabilities. The various methods that are used to enhance
the security of the Bluetooth technology have been discussed in the paper. The paper states the
detailed research methodology that would help to carry out the research in the right track .It is
also expected that the research would be completed within 24 weeks.

2BLUETOOTH SECURITY
Table of Contents
Abstract............................................................................................................................................1
Introduction......................................................................................................................................3
Project Objective.........................................................................................................................3
Project Scope...............................................................................................................................4
Literature Review........................................................................................................................4
Simple way to improve Bluetooth Security.............................................................................4
Analysis of the Bluetooth Security Vulnerabilities.................................................................4
Secure Connections in Bluetooth Scatternets..........................................................................5
Efficient Intrusion Detection and Prevention System for Bluetooth Networks......................6
Detection and attack on the Bluetooth -enabled Cell phones..................................................6
Research Questions......................................................................................................................6
Research Design and Methodology.............................................................................................7
Research Limitation.....................................................................................................................9
Time Schedule.............................................................................................................................9
Conclusion.....................................................................................................................................10
References......................................................................................................................................11

3BLUETOOTH SECURITY
Introduction
The security is always a concern in all the network setup that includes wireless
connection. Since, the devices have the ability to grab the radio waves from the air, it is essential
for people to take extra precautions or measures when they use any wireless connections. It is to
be ensured that the signals do not intercept. The Bluetooth connection also involves wireless
connection and is very much susceptible to security concerns and issues like spying and remote
access (Zhang et al . 2014) .It is similar to the fact how Wi-Fi is susceptible if the network is not
secured . The Bluetooth is a wireless technology that is used for short-range communication. It
make use of the radio waves instead of the wires or cables .The Bluetooth technology finds its
application in millions of products that are being used in our daily life that includes smart phones
,laptops ,headsets and several other devices(Tao and Dai Javad 2013 ).There are several security
concerns pertaining to the use of the Bluetooth technology . Some of the concerns or issues that
are related to the Bluetooth security includes Blue jacking, Blue Bugging, car whisperer
Bluetooth attack and Blue Snarfing (Wang, Wei and Vangury 2014) .
Project Objective
The objective of this project is to discus in details about the most widely recognized and
most commonly used assault pertaining to the use of Bluetooth technology, which is Blue
Snarfing (Zhao, Zhang and Zhang 2014). The Blue Snarf are the people who are mostly
responsible for the lack of secrecy while using Bluetooth technology in the most of the products
that we use in our daily life .This shortcoming in the use of Bluetooth technology ,which is the
BlueSnarfing, will be emphasized and discussed in details .

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Distinct Differences Between Wired and Wireless Technology Essay 2022
|3
|667
|45

Wireless Communication and Networks
|3
|641
|286

Wireless Network Security and Preventive Techniques
|11
|2804
|321

Analysis of Future Wireless Technology
|7
|1376
|60

Assignment Wireless Networking (WSNs)
|9
|1464
|252

Wireless Network Security and Preventive Techniques
|13
|2943
|220