The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (2010 vol. 8)
ISSN: 1540-7993
pp: 20-27
John Paul Dunning , Virginia Tech
ABSTRACT
Bluetooth has become a prominent technology since its public debut in 1998, finding its way into everything from Blackberry smart phones to Samsung home theaters to the Toyota Prius and millions of other devices worldwide. This growth has also made Bluetooth a prime target for hackers. This article presents a taxonomy for threats against Bluetooth-enabled devices, a discussion of several of these threats, and steps for threat mitigation.
INDEX TERMS
Bluetooth, wireless communications, mobile computing, hacking, security taxonomy
CITATION
John Paul Dunning, "Taming the Blue Beast: A Survey of Bluetooth Based Threats", IEEE Security & Privacy, vol. 8, no. , pp. 20-27, March/April 2010, doi:10.1109/MSP.2010.3
98 ms
(Ver 3.1 (10032016))