Безопасность информационных технологий (Sep 2012)

Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities

  • A. A. Pikhtulov,
  • D. V. Shevchenko,
  • V. B. Holiavin

Journal volume & issue
Vol. 19, no. 2S
pp. 36 – 43

Abstract

Read online

Bluetooth technology is very vulnerable, and there are many ways to use it for malicious activity on your mobile device. The review of the different attacks and the creation of their classification are given in this article. This problem is sufficiently urgent, because the creation of the classifications can be the basis for effective protection of Bluetooth protocol.

Keywords