Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/1718
Title: Overview, Working style and Safety Measures for Bluetooth Hacking
Authors: Vashi, Devendra I.
Brahmabhatt, Divya
Jungi, Kamesh
Keywords: Computer Faculty Paper
Faculty Paper
ITFCA008
Issue Date: 11-May-2009
Citation: International Conference On Security and Identity Management (SIM) – 2009, Indian Institute of Management Ahmedabad, May 11-12, 2009, Page No. 1-6
Series/Report no.: ITFCA008-1
Abstract: Bluetooth has shown promise as a wireless ad hoc networking protocol and will only continue to spread as more and more consumers cut the wires from their everyday lives. On the other side of the coin, Bluetooth has also shown the difficulties and pitfalls that exist when implementing a network such as this. Clearly, Bluetooth is not a perfect standard in any way, but it is a step in the right direction. It will be interesting to see what changes and improvements come about in future implementations of Bluetooth. For now, Bluetooth offers convenience and access to a broader base of information, but one must remember that there are people out there with malicious intent, and they can violate Bluetooth security. As long as everyone is aware of this and does their best to maintain some security, then Bluetooth can act as a sufficient step towards a world of secure ad hoc networks.
URI: http://hdl.handle.net/123456789/1718
Appears in Collections:Faculty Papers, CE

Files in This Item:
File Description SizeFormat 
ITFCA008-1.pdfITFCA008-1274.24 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.