Bluetooth Security Attacks

Bluetooth Security Attacks

4.11 - 1251 ratings - Source

Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.LeCroy, CATC scripting language reference manual for CATC Bluetooth analyzers: manual version 1.21 (2013), btcsl_d121.pdf. Accessed 2 May 2013 A. Laurie, M. Holtmann, M. Herfurt, Hacking Bluetooth-enabled mobile phones and beyond: full ... Accessed 2 May 2013 Sony Ericsson, Bluetooth headset HBH-610 user guide (2013), http://i.;...

Title:Bluetooth Security Attacks
Author: Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Publisher:Springer Science & Business Media - 2013-10-28

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA