<strong><em>Smart Card Security: Applications, Attacks, and Countermeasures</em></strong>provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It disc
Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures
β Scribed by Keijo Haataja, Konstantin HyppΓΆnen, Sanna Pasanen, Pekka Toivanen (auth.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2013
- Tongue
- English
- Leaves
- 97
- Series
- SpringerBriefs in Computer Science
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions.
The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.
β¦ Table of Contents
Front Matter....Pages i-vii
Introduction....Pages 1-2
Overview of Bluetooth Security....Pages 3-13
Reasons for Bluetooth Network Vulnerabilities....Pages 15-22
Comparative Analysis of Bluetooth Security Attacks....Pages 23-60
MITM Attacks on Bluetooth....Pages 61-70
Countermeasures....Pages 71-81
New Practical Attack....Pages 83-84
Conclusion and Future Work....Pages 85-88
Back Matter....Pages 89-93
β¦ Subjects
Data Structures, Cryptology and Information Theory;Systems and Data Security;Computer Communication Networks;Security Science and Technology
π SIMILAR VOLUMES
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks as
<p><strong><em>Smart Card Security: Applications, Attacks, and Countermeasures</em></strong> provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It
<p>Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5,
<p>The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals,
<p>Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5,