Path: Top -> Journal -> Jurnal Internasional -> Journal -> Computer
A Review on Key Agreement Protocols used in Bluetooth Standard and Security Vulnerabilities in Bluetooth Transmission
A Review on Key Agreement Protocols used in Bluetooth Standard and Security Vulnerabilities in Bluetooth Transmission
ISSN 2223-4985Journal from gdlhub / 2017-08-14 11:52:32
Oleh : Trishna Panse , Vivek Kapoor , Prashant Panse , International Journal of Information and Communication Technology Research
Dibuat : 2012-06-23, dengan 1 file
Keyword : Bluetooth, Vulnerability, Eavesdropping, Piconet, Bluesnarf, Authentication, Encryption and E0 stream cipher
Subjek : A Review on Key Agreement Protocols used in Bluetooth Standard and Security Vulnerabilities in Bluetooth Transmission
Url : http://esjournals.org/journaloftechnology/archive/vol2no3/vol2no3_12.pdf
Sumber pengambilan dokumen : Internet
This paper gives an overview of protocols used in Bluetooth communication and security weaknesses and vulnerabilities of the Bluetooth
system. Now days, Bluetooth is a frequently used technique for data transmission. Bluetooth standard was come under IEEE 802.15. Its
basic features are ad hoc in nature, very low power consumption and low cost. It operates on radio propagation with 2.4GHZ. Various
types of security protocols are used to prevent eavesdropping and message interception but still some security weaknesses like no
integrity check, man in middle attack, Bluesnarf attack and many more are present in Bluetooth transmission. This paper gives broad
overview of the security flaws in Bluetooth.
This paper gives an overview of protocols used in Bluetooth communication and security weaknesses and vulnerabilities of the Bluetooth
system. Now days, Bluetooth is a frequently used technique for data transmission. Bluetooth standard was come under IEEE 802.15. Its
basic features are ad hoc in nature, very low power consumption and low cost. It operates on radio propagation with 2.4GHZ. Various
types of security protocols are used to prevent eavesdropping and message interception but still some security weaknesses like no
integrity check, man in middle attack, Bluesnarf attack and many more are present in Bluetooth transmission. This paper gives broad
overview of the security flaws in Bluetooth.
Beri Komentar ?#(0) | Bookmark
Properti | Nilai Properti |
---|---|
ID Publisher | gdlhub |
Organisasi | International Journal of Information and Communication Technology Research |
Nama Kontak | Herti Yani, S.Kom |
Alamat | Jln. Jenderal Sudirman |
Kota | Jambi |
Daerah | Jambi |
Negara | Indonesia |
Telepon | 0741-35095 |
Fax | 0741-35093 |
E-mail Administrator | elibrarystikom@gmail.com |
E-mail CKO | elibrarystikom@gmail.com |
Print ...
Kontributor...
- , Editor: fachruddin
Download...
Download hanya untuk member.
2
File : 2.3.12.PDF
(178242 bytes)