2010
DOI: 10.1109/msp.2010.3
|View full text |Cite
|
Sign up to set email alerts
|

Taming the Blue Beast: A Survey of Bluetooth Based Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
53
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 86 publications
(53 citation statements)
references
References 3 publications
0
53
0
Order By: Relevance
“…Human error often leads to data breaks. It was reported that in 1992, human error accounted for a large fraction of internal threats recognized and they are accounts for most intimidations in smaller organizations that usually operate under the notion of total trust in workers, A trust which assumes that staffs always act within the best attention of the company [36].…”
Section: Security Of Informationmentioning
confidence: 99%
“…Human error often leads to data breaks. It was reported that in 1992, human error accounted for a large fraction of internal threats recognized and they are accounts for most intimidations in smaller organizations that usually operate under the notion of total trust in workers, A trust which assumes that staffs always act within the best attention of the company [36].…”
Section: Security Of Informationmentioning
confidence: 99%
“…Table 3. The threats intended for the Bluetooth tehnology [23] The threat classification of the Bluetooth technology is presented in [23] where the threats are classified into nine categories. Each threat is different, therefore each one is assigned to a threat level category.…”
Section: Range Extensionmentioning
confidence: 99%
“…Bluetooth is often used to automatically pair mobile phones with peripheral devices. Bluetooth has been extensively considered as a possible vector for denial of service attacks [7,17,33]. Some of the papers focus on Bluetooth's potential for tying up network resources via signal jamming [7,33] .…”
Section: Denial Of Service In Mobile Devicesmentioning
confidence: 99%
“…Some of the papers focus on Bluetooth's potential for tying up network resources via signal jamming [7,33] . Along with signal jamming, there has been research into using Bluetooth denial service to cause battery exhaustion [17].…”
Section: Denial Of Service In Mobile Devicesmentioning
confidence: 99%