Security analysis and evaluation of Bluetooth technology

Loading...
Thumbnail Image
Supplementary material
Other Title
Authors
Majumder, I.
Buttar, A.
Bickerton, T.
David, Andrew
Author ORCID Profiles (clickable)
Degree
Grantor
Date
2022-12-09
Supervisors
Type
Conference Contribution - Oral Presentation
Ngā Upoko Tukutuku (Māori subject headings)
Keyword
Bluetooth technology
network security
Citation
Majumder, I., Buttar, A., Bickerton, T., & David, A. (2022, December, 8-9). Security analysis and evaluation of Bluetooth technology [Paper presentation]. Rangahau: Te Mana o te Mahi Kotahitanga: Research: The Power of Collaboration, MIT/Unitec Research Symposium 2022, Te Pūkenga, New Zealand
Abstract
Overview - Bluetooth technology Implementation - attack stages: obfuscation, surveillance, fuzzer attack, range extension, sniffing, man-in-the-middle, denial of service (DOS), unauthorised direct data access (UDDA), malware Vulnerabilities Challenges Risk assessment Mitigation measures & security recommendation for user awareness Conclusion
Publisher
Link to ePress publication
DOI
Copyright holder
Authors
Copyright notice
All rights reserved
Copyright license
Available online at
This item appears in: