Security analysis and evaluation of Bluetooth technology
Loading...
Supplementary material
Other Title
Authors
Majumder, I.
Buttar, A.
Bickerton, T.
David, Andrew
Buttar, A.
Bickerton, T.
David, Andrew
Author ORCID Profiles (clickable)
Degree
Grantor
Date
2022-12-09
Supervisors
Type
Conference Contribution - Oral Presentation
Ngā Upoko Tukutuku (Māori subject headings)
Keyword
Bluetooth technology
network security
network security
ANZSRC Field of Research Code (2020)
Citation
Majumder, I., Buttar, A., Bickerton, T., & David, A. (2022, December, 8-9). Security analysis and evaluation of Bluetooth technology [Paper presentation]. Rangahau: Te Mana o te Mahi Kotahitanga: Research: The Power of Collaboration, MIT/Unitec Research Symposium 2022, Te Pūkenga, New Zealand
Abstract
Overview - Bluetooth technology
Implementation - attack stages:
obfuscation, surveillance, fuzzer attack, range extension, sniffing, man-in-the-middle, denial of service
(DOS), unauthorised direct data access (UDDA), malware
Vulnerabilities
Challenges
Risk assessment
Mitigation measures & security recommendation for user awareness
Conclusion
Publisher
Permanent link
Link to ePress publication
DOI
Copyright holder
Authors
Copyright notice
All rights reserved