logo

Classification of Bluetooth Smart Technology Attacks and Defenses

   

Added on  2023-04-06

29 Pages5740 Words58 Views
Running head: CLASSIFICATION OF BLUETOOTH SMART TECHNOLOGY ATTACKS
AND DEFENSES
CLASSIFICATION OF BLUETOOTH SMART TECHNOLOGY ATTACKS AND
DEFENSES
Name of the Student
Name of the University
Classification of Bluetooth Smart Technology Attacks and Defenses_1
2
CLASSIFICATION OF BLUETOOTH SMART TECHNOLOGY ATTACKS AND
DEFENSES
Table of Contents
1. Introduction..................................................................................................................................3
1.1 Background............................................................................................................................3
1.2 Aim, Objectives and Research Questions..............................................................................4
1.3 Research Structure.................................................................................................................5
2. Literature review..........................................................................................................................6
2.1 Concept of Bluetooth technology..........................................................................................6
2.2. Bluetooth Security................................................................................................................7
2.3 Bluetooth Vulnerabilities and threats....................................................................................8
2.4 Different types of attacks.....................................................................................................10
2.5 Bluetooth Risk Mitigation and Countermeasures................................................................15
3. Threats of Bluetooth..................................................................................................................17
4. Counter Measures......................................................................................................................17
5. Conclusion and Recommendations............................................................................................17
5.1 Conclusion...........................................................................................................................17
5.2 Recommendations................................................................................................................17
5.3 Future Work.........................................................................................................................18
Classification of Bluetooth Smart Technology Attacks and Defenses_2
3
CLASSIFICATION OF BLUETOOTH SMART TECHNOLOGY ATTACKS AND
DEFENSES
1. Introduction
1.1 Background
Bluetooth technology has been a key component of wireless communications that helps in
providing a low-energy and low-cost solution for short range radio transmissions. Bluetooth or
Bluetooth Low Energy (BLE) has been becoming a predominant technology in order to connect
IoT. It has been found in cell phones, speaker, printers, keyboards, automobiles and headsets.
The technology has been also found in automated smart homes, mobiles and cameras
(Sundaravadivel et al. 2017). It has been offering various types of technological advances in
data transferring facility. Bluetooth has been one of the preferred network in the IoT devices.
This has been mainly due to utilizing minimum power supply from the devices. Data transfer has
been the major outcomes of the Bluetooth technology. This technology has been maintaining a
keen approach in the development of data transfer unit in the system. Bluetooth technologies
have been a convenient wireless technology that have been utilized by millions of devices (Liu
and Sun 2016). The threats included in the Bluetooth technology has been maintaining keen
approach in the development of the technology. This can be motivated by maintaining a keen
approach in the development of wireless technology. The intrusion detection system of
Bluetooth technology has not been well performed in the electronic gadgets. Therefore, the
vulnerability and risks included in the Bluetooth technology has been performed by filling up the
vulnerability investigation. This research has focused on examining risks and vulnerability of
Bluetooth technologies (Ho et al. 2016). The Bluetooth technology has been growing up with
proper enhancement and improvement in the market. Various versions of Bluetooth have been
developed in the market related with the adversity of technology. However, Bluetooth
technology has been facing changes with its security and threats issue. There have been various
Classification of Bluetooth Smart Technology Attacks and Defenses_3
4
CLASSIFICATION OF BLUETOOTH SMART TECHNOLOGY ATTACKS AND
DEFENSES
types of attacks described in the research onwards. There has been need of high awareness
among users of Bluetooth regarding its security challenges. Users have been trapped during data
transfer (Lee et al. 2014). This study has highlighted various types of vulnerabilities and security
issues in the Bluetooth. This paper has helped in mitigating these threats and attacks. Various
mitigating technique have been discussed in the paper.
1.2 Aim, Objectives and Research Questions
The aim of the study is to identify various types of security issues and vulnerabilities in the
Bluetooth technology. Additionally, several mitigating techniques have been discussed in the
paper.
Following are the objectives of the research:
To identify security issues and vulnerabilities of Bluetooth technology
To identify various mitigation strategies for improving security issues and vulnerabilities
in Bluetooth technologies
To provide recommendations for improving security issues mitigation techniques in
Bluetooth technology
Following are research questions:
What are security issues and vulnerabilities faced in the Bluetooth technology?
What are several mitigation strategies for improving security issues and vulnerabilities in
Bluetooth technologies?
How this mitigation techniques for reducing security issues and vulnerabilities in the
Bluetooth technology can be improved more?
Classification of Bluetooth Smart Technology Attacks and Defenses_4
5
CLASSIFICATION OF BLUETOOTH SMART TECHNOLOGY ATTACKS AND
DEFENSES
1.3 Research Structure
Chapter 1: Introduction
Chapter 2: Literature Review
Chapter 3: Risks and Vulnerabiities
Chapter 4: MItigation techniques
Chapter 5: Conclusion and Mitigation
Classification of Bluetooth Smart Technology Attacks and Defenses_5
6
CLASSIFICATION OF BLUETOOTH SMART TECHNOLOGY ATTACKS AND
DEFENSES
2. Literature review
2.1 Concept of Bluetooth technology
As research done by Suarez-Tangil et al. (2013), Bluetooth technology has been invented in 1994
by Ericsson Telecommunication Company in Sweden. It has been able to create an ad-hoc, short-
range wireless network that helps in allowing devices for connecting with one another. Ericsson
combined with IBM, Intel, Nokia and Toshiba for creating a Special Interest Group in 1998. This
helped in developing open industry standard for Bluetooth Technology. Bluetooth 1.1 has been
improved to upgraded version of Bluetooth 1.2 known as Basic Rate (BR). These have been
allowing transmission speed upto 1 Mbps. Bluetooth version 2.0 have been known as Enhanced
Data Rae (EDR) that has been allowing speed upto 3 Mbps (Fernandes et al. 2017). Bluetooth
version 3.0 has been termed as the Highest Speed (HS) that is able to provide speed of 24 Mbps.
Bluetooth version 4.0 is termed as Low Energy (BLE) which has been simply more effective and
efficient. Therefore, the technology has been updating at fast rate in the market. As research done
by Goyal, Dragoni and Spognardi (2016), GFSK has been a method of modulation used for
modulation in digital communication. It has been able to send data by shifting carrier frequencies
by Gaussian filtering square-wave signals. As commented by Chhaya et al. (2017), Bluetooth
technology has been continuously evolving and improving its technological aspects.
As research done by Cyr et al. (2014), benefits of the technology has been its ability to transfer
both voice and data simultaneously. The coexistence of wireless technology has been resulting in
Bluetooth signals harmed by other wireless technologies. Bluetooth technologies have been
using hops in the Bluetooth frequency by other wireless technologies. Bluetooth technologies
can be used for connecting two Bluetooth enabled devices. These devices can communicate by
Classification of Bluetooth Smart Technology Attacks and Defenses_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Technologies: Recent Exploits and Mitigation Strategies
|8
|1590
|446

Cyber Issues in Smart Home Appliances of IoT
|26
|7130
|13

Smart City Security (IoT): Security threats and vulnerabilities faced by smart road traffic control systems
|5
|2316
|342

Security of Emerging Connected Systems Assignment PDF
|17
|3637
|141

Wireless Networking Concepts - Comparative Analysis and Ping Test
|7
|1157
|119

Bluetooth Security
|14
|3034
|61