Taming the blue beast: A survey of bluetooth based threats

J Dunning - IEEE Security & Privacy, 2010 - ieeexplore.ieee.org
Taming the Blue Beast: A Survey of Bluetooth Based Threats Page 1 Mobile Device Security 20
COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES ■ …

[图书][B] Bluetooth security attacks: comparative analysis, attacks, and countermeasures

K Haataja, K Hyppönen, S Pasanen, P Toivanen - 2013 - books.google.com
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of
devices for short-range wireless data and real-time audio or video transfer. In this book the …

Security vulnerabilities in Bluetooth technology as used in IoT

AM Lonzetta, P Cope, J Campbell, BJ Mohd… - Journal of Sensor and …, 2018 - mdpi.com
Bluetooth technology is a key component of wireless communications. It provides a low-
energy and low-cost solution for short-range radio transmissions. Bluetooth, more …

Blacktooth: breaking through the defense of bluetooth in silence

M Ai, K Xue, B Luo, L Chen, N Yu, Q Sun… - Proceedings of the 2022 …, 2022 - dl.acm.org
Bluetooth is a short-range wireless communication technology widely used by billions of
personal computing, IoT, peripheral, and wearable devices. Bluetooth devices exchange …

Security threats in Bluetooth technology

SS Hassan, SD Bibon, MS Hossain… - Computers & Security, 2018 - Elsevier
Bluetooth allows connecting mobile devices in short range in order to transfer files/videos. It
is now a popular means of short range wireless communication. Although Bluetooth is …

An investigation of Bluetooth security vulnerabilities

P Cope, J Campbell, T Hayajneh - 2017 IEEE 7th annual …, 2017 - ieeexplore.ieee.org
As Bluetooth technology has evolved and improved over the years, it has gained
widespread acceptance and is increasingly found in many aspects of everyday life. It's …

[图书][B] Bluetooth security

C Gehrmann, J Persson, B Smeets - 2004 - books.google.com
" This resource examine the most significant attacks on Bluetooth security mechanisms and
their implementations, demonstrating how some of these known weaknesses can be …

Sok: The long journey of exploiting and defending the legacy of king harald bluetooth

J Wu, R Wu, D Xu, DJ Tian… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Named after the Viking King Harald Bluetooth, Bluetooth is the de facto standard for short-
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …

[HTML][HTML] A survey on Bluetooth Low Energy security and privacy

M Cäsar, T Pawelke, J Steffan, G Terhorst - Computer Networks, 2022 - Elsevier
Since its introduction in 2009, Bluetooth Low Energy (BLE) has become a remarkable
success. Due to its unique properties of low power requirements and its ubiquitous …

Securing Bluetooth Low Energy networking: An overview of security procedures and threats

A Lacava, V Zottola, A Bonaldo, F Cuomo, S Basagni - Computer Networks, 2022 - Elsevier
Abstract Bluetooth Low Energy (BLE) is rapidly becoming the de-facto standard for short-
range wireless communications among resource-constrained wireless devices. Securing …