Search icone
Search and publish your papers

Network security on Bluetooth

Or download with : a doc exchange

About the author


About the document

Published date
documents in English
5 pages
0 times
Validated by
0 Comment
Rate this document
  1. Abstract
  2. Introduction
  3. Bluetooth overview
  4. Key characteristics of bluetooth technology
  5. Problems with the bluetooth standard security
  6. Security recommendations
  7. Conclusion
  8. References

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless local area network (WLAN) devices, for instance, allow users to move their laptops from place to place within their offices without the need for wires and without losing network connectivity. Less wiring means greater flexibility, increased efficiency, and reduced wiring costs. In our Presentation we first confer the various functionalities of Wireless communication and state the applications of Bluetooth Technology. Further we move on to discuss the risks and problems inherent in using Bluetooth. We precede the discussion to narrate the key characteristics of Bluetooth and a few implementations of Bluetooth Technology with pictures. As we move to the core of paper we itemize the benefits of Bluetooth and carry on with various security modes of Bluetooth technology. Not only have this but we even enclosed the problems with Bluetooth security. Finally we wind up our discussion suggesting some Management, Technical and Operational recommendations.

[...] Unauthorized users may gain access to agency systems and information, corrupt the agency's data, consume network bandwidth, degrade network performance and launch attacks that prevent authorized users from accessing the network, or use agency resources to launch attacks on other networks Bluetooth Overview Adhoc networks today are based primarily on Bluetooth technology. Bluetooth is an open standard for short-range digital radio. It is touted as a low-cost, low-power, and low-profile technology that provide a mechanism for creating small wireless networks on an adhoc basis. [...]

[...] Use smart card technology in the Bluetooth network to provide key management. Install antivirus software on intelligent, Bluetooth-enabled hosts. Fully test and deploy software Bluetooth patches and upgrades regularly. Deploy user authentication such as biometrics, smart cards, two- factor authentication, or PKI. Deploy intrusion detection agents on the wireless part of the network to detect suspicious behavior or unauthorized access and activity. Fully understand the impacts of deploying any security feature or product prior to deployment. Designate an individual to track the progress of Bluetooth security products and standards (perhaps via the Bluetooth SIG) and the threats and vulnerabilities with the technology. [...]

Similar documents you may be interested in reading.

The impact of technological development on mobile phone companies living in a virtual world

 Business & market   |  Business strategy   |  Presentation   |  07/07/2008   |   .doc   |   6 pages

Location-based service over 3GPP IMS: Approaching real-time connectivity with the next generation...

 Science & technology   |  Electronics   |  Presentation   |  06/11/2009   |   .pdf   |   5 pages

Recent documents in electronics category

The speculation around Sphero's BB-8

 Science & technology   |  Electronics   |  Presentation   |  11/10/2015   |   .pdf   |   2 pages

Sphero's BB-8, the cross-generational companion

 Science & technology   |  Electronics   |  Presentation   |  11/10/2015   |   .pdf   |   1 page