Vai al contenuto principale della pagina
Autore: | Haataja Keijo |
Titolo: | Bluetooth security attacks : comparative analysis, attacks, and countermeasures / / Keijo Haataja [and three others] |
Pubblicazione: | New York : , : Springer, , 2013 |
Edizione: | 1st ed. 2013. |
Descrizione fisica: | 1 online resource (vii, 93 pages) : illustrations (some color) |
Disciplina: | 005.8 |
Soggetto topico: | Bluetooth technology - Security measures |
Computer networks - Security measures | |
Persona (resp. second.): | HyppönenKonstantin |
PasanenSanna | |
ToivanenPekka | |
Note generali: | "ISSN: 2191-5768." |
Nota di bibliografia: | Includes bibliographical references. |
Nota di contenuto: | Chap. 1 - Introduction -- Chap. 2 - Overview of Bluetooth Security -- Chap. 3 - Bluetooth Network Vulnerabilities -- Chap. 4 - Comparative Analysis of Bluetooth Security Attacks -- Chap. 5 - Meet-in-the-Middle (MITM) Attacks on Bluetooth -- Chap. 6 - Countermeasures -- Chap. 7 - New Practical Attack -- Chap. 8 - Conclusion and Future Work References. |
Sommario/riassunto: | Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices. |
Titolo autorizzato: | Bluetooth Security Attacks |
ISBN: | 3-642-40646-7 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910437585903321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |