Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures /

Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literatur...

Full description

Main Authors: Haataja, Keijo. (Author, http://id.loc.gov/vocabulary/relators/aut), Hyppönen, Konstantin. (http://id.loc.gov/vocabulary/relators/aut), Pasanen, Sanna. (http://id.loc.gov/vocabulary/relators/aut), Toivanen, Pekka. (http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Edition:1st ed. 2013.
Series:SpringerBriefs in Computer Science,
Subjects:
Online Access:https://doi.org/10.1007/978-3-642-40646-1
Summary:Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.
Physical Description:VII, 93 p. 31 illus. online resource.
ISBN:9783642406461
ISSN:2191-5768