𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures

✍ Scribed by Keijo Haataja, Konstantin Hyppânen, Sanna Pasanen, Pekka Toivanen (auth.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2013
Tongue
English
Leaves
97
Series
SpringerBriefs in Computer Science
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions.

The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.

✦ Table of Contents


Front Matter....Pages i-vii
Introduction....Pages 1-2
Overview of Bluetooth Security....Pages 3-13
Reasons for Bluetooth Network Vulnerabilities....Pages 15-22
Comparative Analysis of Bluetooth Security Attacks....Pages 23-60
MITM Attacks on Bluetooth....Pages 61-70
Countermeasures....Pages 71-81
New Practical Attack....Pages 83-84
Conclusion and Future Work....Pages 85-88
Back Matter....Pages 89-93

✦ Subjects


Data Structures, Cryptology and Information Theory;Systems and Data Security;Computer Communication Networks;Security Science and Technology


πŸ“œ SIMILAR VOLUMES


Smart Card Security: Applications, Attac
✍ B. B. Gupta; Megha Quamara πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press 🌐 English

<strong><em>Smart Card Security: Applications, Attacks, and Countermeasures</em></strong>provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It disc

Smart Card Security: Applications, Attac
✍ B.B. Gupta, Megha Quamara πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press/Routledge/Taylor & Francis Group 🌐 English

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks as

Smart Card Security-Applications, Attack
✍ B.B. Gupta (Author); Megha Quamara (Author) πŸ“‚ Library πŸ“… 2019 πŸ› CRC Press

<p><strong><em>Smart Card Security: Applications, Attacks, and Countermeasures</em></strong> provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It

Cross-Site Scripting Attacks-Classificat
✍ B. B. Gupta (Author); Pooja Chaudhary (Author) πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press

<p>Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5,

Internet of Things Security-Principles,
✍ Brij B. Gupta (Author); Megha Quamara (Author) πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press

<p>The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals,

Cross-Site Scripting Attacks: Classifica
✍ B. B. Gupta, Pooja Chaudhary πŸ“‚ Library πŸ“… 2020 πŸ› Taylor & Francis Ltd 🌐 English

<p>Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5,