Text
Bluetooth security attacks: comparative analysis, attacks, and countermeasures
Table of contents:
1.Introduction
2.Overview of Bluetooth Security
3.Reasons for Bluetooth Network Vulnerabilities
3.1.Vulnerability to Eavesdropping
3.2.Weaknesses in Encryption Mechanisms
3.3.Weaknesses in PIN Code Selection
3.4.Weaknesses in Association Models of SSP
3.5.Weaknesses in Device Configuration
4.Comparative Analysis of Bluetooth Security Attacks
4.1.Disclosure Threats
4.2.Integrity Threats
4.3.DoS Threats
4.4.Multithreats
5.MITM Attacks on Bluetooth
5.1.MITM Attacks on SSP
5.2.Comparative Analysis of Bluetooth MITM Attacks
6.Countermeasures
6.1.Intrusion Detection and Prevention System
6.2.RF Fingerprint-Based Security Solution for SSP
6.3.Countermeasures for Bluetooth Devices up to 2.0 + EDR
6.4.Countermeasures for SSP-Enabled Bluetooth Devices
7.New Practical Attack
8.Conclusion and Future Work
No other version available