Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research...
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or...
Bluetooth is a technology for short range wireless communication. It can be used to connect almost any device to another device. Bluetooth-enabled devices, such as mobile phones, headsets, PCs, laptops, printers, mice, and keyboards, are widely used all over the world. Therefore, it is very important to keep Bluetooth security issues up-to-date. The aim of this book is to evaluate security threats in Bluetooth-enabled systems. The book concentrates on practical aspects of Bluetooth security: weaknesses of Bluetooth security are studied, new attacks are proposed, new Bluetooth security...
Bluetooth is a technology for short range wireless communication. It can be used to connect almost any device to another device. Bluetooth-enabled dev...