Bluetooth Intrusion Techniques

Bluetooth technology has grown through the years, but because of the increase, security has become an issue. In all the world the people interacting and use this technology, when transferring data through devices or when using the computer or personal devices, null confidentiality and null authenticity are factors to remain secure. How this technology are very common, malicious exploits attack all time searching find access. In this paper, the authors shown different exploits and vulnerabilities that are either in the design already, or have been maliciously exploited.

Provided by: International Research Association of Computer Science and Technology (IRACST) Topic: Mobility Date Added: Feb 2012 Format: PDF

Download Now

Find By Topic