Title :
Bluetooth security analysis for mobile phones
Author :
Alfaiate, João ; Fonseca, José
Author_Institution :
UDI - Res. Unit for Inland Dev., Guarda Polytech. Inst., Guarda, Portugal
Abstract :
Mobile devices are becoming more and more omnipresent due to their lightweight, small size and increasing performance. Almost every mobile device has Bluetooth (BT) capabilities and this powerful combination widely used in our daily life is coming to new environments like the car and the military industries. As any technology, BT has security issues that hackers have extensively exploited over the years, while users seem not to care too much. To raise the security awareness we present an analysis of BT attack methods and tools over time. We paid particular attention to the severity, possible targets and the ability to persist over new versions of BT. Results show that adversaries can take complete control of the victims´ mobile device features if they forget to use simple safety measures like turning off the BT when not in use. To increase security we also propose the development of a novel BT Firewall.
Keywords :
Bluetooth; authorisation; mobile computing; mobile radio; telecommunication security; BT attack method; BT firewall; Bluetooth security analysis; mobile device; mobile phones; Bluetooth; Fires; Mobile communication; Mobile handsets; Performance evaluation; Protocols; Security; Attack; Bluetooth; Hack; Mobile Phones; Security;
Conference_Titel :
Information Systems and Technologies (CISTI), 2012 7th Iberian Conference on
Conference_Location :
Madrid
Print_ISBN :
978-1-4673-2843-2