LEADER 02840oam 2200493 450 001 9910437585903321 005 20190911112726.0 010 $a3-642-40646-7 024 7 $a10.1007/978-3-642-40646-1 035 $a(OCoLC)874932637 035 $a(MiFhGG)GVRL6XVO 035 $a(EXLCZ)993710000000024394 100 $a20130829d2013 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aBluetooth security attacks $ecomparative analysis, attacks, and countermeasures /$fKeijo Haataja [and three others] 205 $a1st ed. 2013. 210 1$aNew York :$cSpringer,$d2013. 215 $a1 online resource (vii, 93 pages) $cillustrations (some color) 225 1 $aSpringerBriefs in Computer Science,$x2191-5768 300 $a"ISSN: 2191-5768." 311 $a3-642-40645-9 320 $aIncludes bibliographical references. 327 $aChap. 1 - Introduction -- Chap. 2 - Overview of Bluetooth Security -- Chap. 3 - Bluetooth Network Vulnerabilities -- Chap. 4 - Comparative Analysis of Bluetooth Security Attacks -- Chap. 5 - Meet-in-the-Middle (MITM) Attacks on Bluetooth -- Chap. 6 - Countermeasures -- Chap. 7 - New Practical Attack -- Chap. 8 - Conclusion and Future Work References. 330 $aBluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices. 410 0$aSpringerBriefs in computer science. 606 $aBluetooth technology$xSecurity measures 606 $aComputer networks$xSecurity measures 615 0$aBluetooth technology$xSecurity measures. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 700 $aHaataja$b Keijo$4aut$4http://id.loc.gov/vocabulary/relators/aut$01058044 702 $aHyppönen$b Konstantin$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aPasanen$b Sanna$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aToivanen$b Pekka$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910437585903321 996 $aBluetooth Security Attacks$92496651 997 $aUNINA