Security threats in Bluetooth technology (original) (raw)
Related papers
Security overview of Bluetooth
2004
Analysis of Security Risks in Bluetooth
A Survey on security Threats and Vulnerability attacks on Bluetooth Communication
Bluetooth Security Threats: A Survey
International Research Group - IJET JOURNAL
Security Vulnerabilities in Bluetooth Technology as Used in IoT
Journal of Sensor and Actuator Networks
Bluetooth Technology: Security Issues and Its Prevention
BlueLock a tool to prevent Bluetooth attacks
Gerardo Alberto Castang Montiel
Visión electrónica, 2020
Attacks on Bluetooth and its security: A Comprehensive Literature Review
The Journal of Applied Sciences Research, 2015
GENERAL APPROACH FOR BLUETOOTH NETWORK SECURITY SYSTEM
Volume 1 Issue 3
A Comparative Study of Security Attacks in Bluetooth, Wi-Fi and Wimax
A design approach for wireless communication security in bluetooth network
2014
A Review on Security Mechanism of Bluetooth Communication
2012
Security Analysis of Bluetooth Enabled Mobile Devices
2015
A Mathematical Model to the Security Issues of Bluetooth using Elliptic Curve Cryptography
International Journal of Computer Applications, 2017
Current Trends and Reaserch Issues in Bluetooth Comunication
A Systematic Review of Bluetooth Security Threats, Attacks & Analysis
https://ijcttjournal.org, 2021
2013
Security in Bluetooth, RFID and wireless sensor networks
2011
A Survey over the Security Issues of Bluetooth using Elliptic Curve Cryptography
International Journal of Computer Applications, 2016
An architecture design for wireless authentication security in bluetooth network
2014
Man in the Middle Attack of Bluetooth and their Solution
IAEME PUBLICATION, 2014
A Simple Way to Improve the Security of Bluetooth Devices
… on Applications and the Internet, 2008. …, 2008
Case study on the Bluetooth vulnerabilities in mobile devices
2006
Enhancements to Bluetooth Baseband Security
2007
Secure Bluetooth for Trusted m-Commerce
Int'l J. of Communications, Network and System Sciences, 2013
Hardware implementation of bluetooth security
IEEE Pervasive Computing, 2003