|
GENERAL APPROACH FOR BLUETOOTH NETWORK SECURITY SYSTEMKeywords: Bluetooth device , source device , destination device , user , connecting media , mobile phones , wireless media etc Abstract: Bluetooth provides a short range wireless communication between devices making it convenient for usersand thus eliminating the need for messy cables. According to Bluetooth Special Interest Group Bluetoothwireless technology is the most widely supported, versatile, and secure wireless standard on the markettoday. Bluetooth operates in the open 2.4 GHz ISM band and is now found in a vast array of productssuch as input devices, printers, medical devices, VoIP phones, whiteboards, and surveillance cameras.However the proliferation of these devices in the workplace exposes organizations to security risks.Detecting Bluetooth Security Vulnerabilities, This paper will explain what Bluetooth is, how it works,and some of the vulnerabilities and risks associated with it. In the past, the only way to connect computerstogether for the purpose of sharing information and/or resources was to connect them via cables. This canbe not only cumbersome to set up, but it can get messy real quick. Bluetooth provides a solution to thisproblem by providing a cable-free environment. The key features of Bluetooth technology are robustness,low power, and low cost. The Bluetooth specification defines a uniform structure for a wide range ofdevices to connect and communicate with each other.
|