Path: Top -> Journal -> Jurnal Internasional -> Journal -> Computer

A Review on Key Agreement Protocols used in Bluetooth Standard and Security Vulnerabilities in Bluetooth Transmission

A Review on Key Agreement Protocols used in Bluetooth Standard and Security Vulnerabilities in Bluetooth Transmission

ISSN 2223-4985
Journal from gdlhub / 2017-08-14 11:52:32
Oleh : Trishna Panse , Vivek Kapoor , Prashant Panse , International Journal of Information and Communication Technology Research
Dibuat : 2012-06-23, dengan 1 file

Keyword : Bluetooth, Vulnerability, Eavesdropping, Piconet, Bluesnarf, Authentication, Encryption and E0 stream cipher
Subjek : A Review on Key Agreement Protocols used in Bluetooth Standard and Security Vulnerabilities in Bluetooth Transmission
Url : http://esjournals.org/journaloftechnology/archive/vol2no3/vol2no3_12.pdf
Sumber pengambilan dokumen : Internet

This paper gives an overview of protocols used in Bluetooth communication and security weaknesses and vulnerabilities of the Bluetooth


system. Now days, Bluetooth is a frequently used technique for data transmission. Bluetooth standard was come under IEEE 802.15. Its


basic features are ad hoc in nature, very low power consumption and low cost. It operates on radio propagation with 2.4GHZ. Various


types of security protocols are used to prevent eavesdropping and message interception but still some security weaknesses like no


integrity check, man in middle attack, Bluesnarf attack and many more are present in Bluetooth transmission. This paper gives broad


overview of the security flaws in Bluetooth.

Deskripsi Alternatif :

This paper gives an overview of protocols used in Bluetooth communication and security weaknesses and vulnerabilities of the Bluetooth


system. Now days, Bluetooth is a frequently used technique for data transmission. Bluetooth standard was come under IEEE 802.15. Its


basic features are ad hoc in nature, very low power consumption and low cost. It operates on radio propagation with 2.4GHZ. Various


types of security protocols are used to prevent eavesdropping and message interception but still some security weaknesses like no


integrity check, man in middle attack, Bluesnarf attack and many more are present in Bluetooth transmission. This paper gives broad


overview of the security flaws in Bluetooth.

Beri Komentar ?#(0) | Bookmark

PropertiNilai Properti
ID Publishergdlhub
OrganisasiInternational Journal of Information and Communication Technology Research
Nama KontakHerti Yani, S.Kom
AlamatJln. Jenderal Sudirman
KotaJambi
DaerahJambi
NegaraIndonesia
Telepon0741-35095
Fax0741-35093
E-mail Administratorelibrarystikom@gmail.com
E-mail CKOelibrarystikom@gmail.com

Print ...

Kontributor...

  • , Editor: fachruddin

Download...

  • Download hanya untuk member.

    2
    Download Image
    File : 2.3.12.PDF

    (178242 bytes)