|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910437585903321 |
|
|
Autore |
Haataja Keijo |
|
|
Titolo |
Bluetooth security attacks : comparative analysis, attacks, and countermeasures / / Keijo Haataja [and three others] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York : , : Springer, , 2013 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2013.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (vii, 93 pages) : illustrations (some color) |
|
|
|
|
|
|
Collana |
|
SpringerBriefs in Computer Science, , 2191-5768 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Bluetooth technology - Security measures |
Computer networks - Security measures |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Chap. 1 - Introduction -- Chap. 2 - Overview of Bluetooth Security -- Chap. 3 - Bluetooth Network Vulnerabilities -- Chap. 4 - Comparative Analysis of Bluetooth Security Attacks -- Chap. 5 - Meet-in-the-Middle (MITM) Attacks on Bluetooth -- Chap. 6 - Countermeasures -- Chap. 7 - New Practical Attack -- Chap. 8 - Conclusion and Future Work References. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices. |
|
|
|
|
|
|
|