Bluetooth Security Analysis for Mobile Phones

被引:0
作者
Alfaiate, Joao [1 ]
Fonseca, Jose [1 ]
机构
[1] Guarda Polytech Inst, UDI Res Unit Inland Dev, Oporto, Portugal
来源
7TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2012) | 2012年
关键词
Mobile Phones; Security; Hack; Attack; Bluetooth;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices are becoming more and more omnipresent due to their lightweight, small size and increasing performance. Almost every mobile device has Bluetooth (BT) capabilities and this powerful combination widely used in our daily life is coming to new environments like the car and the military industries. As any technology, BT has security issues that hackers have extensively exploited over the years, while users seem not to care too much. To raise the security awareness we present an analysis of BT attack methods and tools over time. We paid particular attention to the severity, possible targets and the ability to persist over new versions of BT. Results show that adversaries can take complete control of the victims' mobile device features if they forget to use simple safety measures like turning off the BT when not in use. To increase security we also propose the development of a novel BT Firewall.
引用
收藏
页数:6
相关论文
共 16 条
[1]  
[Anonymous], 2007, ZDNET 0921
[2]  
[Anonymous], 2009, Bluetooth specification Version 4.0
[3]  
[Anonymous], WIR DEV MOB PHON
[4]  
[Anonymous], 2009, WIRELESS MOBILE 1012
[5]  
[Anonymous], 2002, NOK 30 GSM CONN TERM
[6]  
JavaTM APIs for BluetoothTM Wireless Technology (JSR-82), 2002, JAVATM APIS BLUETOOT
[7]  
Kumparak Greg, 2010, APPLE SOLD 8 75 MILL
[8]  
Lindell A.Y., 2008, Attacks on the pairing protocol of Bluetooth v2.1
[9]  
Media Ford, 2007, FORD TEAMS MICR DEL
[10]  
Mohamed GHALLALI, 2011, MOMM2011 5 7 DEC HO