02840oam 2200493 450 991043758590332120190911112726.03-642-40646-710.1007/978-3-642-40646-1(OCoLC)874932637(MiFhGG)GVRL6XVO(EXLCZ)99371000000002439420130829d2013 uy 0engurun|---uuuuatxtccrBluetooth security attacks comparative analysis, attacks, and countermeasures /Keijo Haataja [and three others]1st ed. 2013.New York :Springer,2013.1 online resource (vii, 93 pages) illustrations (some color)SpringerBriefs in Computer Science,2191-5768"ISSN: 2191-5768."3-642-40645-9 Includes bibliographical references.Chap. 1 - Introduction -- Chap. 2 - Overview of Bluetooth Security -- Chap. 3 - Bluetooth Network Vulnerabilities -- Chap. 4 - Comparative Analysis of Bluetooth Security Attacks -- Chap. 5 - Meet-in-the-Middle (MITM) Attacks on Bluetooth -- Chap. 6 - Countermeasures -- Chap. 7 - New Practical Attack -- Chap. 8 - Conclusion and Future Work References.Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.SpringerBriefs in computer science.Bluetooth technologySecurity measuresComputer networksSecurity measuresBluetooth technologySecurity measures.Computer networksSecurity measures.005.8Haataja Keijoauthttp://id.loc.gov/vocabulary/relators/aut1058044Hyppönen Konstantinauthttp://id.loc.gov/vocabulary/relators/autPasanen Sannaauthttp://id.loc.gov/vocabulary/relators/autToivanen Pekkaauthttp://id.loc.gov/vocabulary/relators/autMiFhGGMiFhGGBOOK9910437585903321Bluetooth Security Attacks2496651UNINA