Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities
Bluetooth technology is very vulnerable, and there are many ways to use it for malicious activity on your mobile device. The review of the different attacks and the creation of their classification are given in this article. This problem is sufficiently urgent, because the creation of the classifica...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2012-09-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/450 |
_version_ | 1827846608732028928 |
---|---|
author | A. A. Pikhtulov D. V. Shevchenko V. B. Holiavin |
author_facet | A. A. Pikhtulov D. V. Shevchenko V. B. Holiavin |
author_sort | A. A. Pikhtulov |
collection | DOAJ |
description | Bluetooth technology is very vulnerable, and there are many ways to use it for malicious activity on your mobile device. The review of the different attacks and the creation of their classification are given in this article. This problem is sufficiently urgent, because the creation of the classifications can be the basis for effective protection of Bluetooth protocol. |
first_indexed | 2024-03-12T09:18:23Z |
format | Article |
id | doaj.art-d0136fabae9246bc80e8b4c3aca2b866 |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T09:18:23Z |
publishDate | 2012-09-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-d0136fabae9246bc80e8b4c3aca2b8662023-09-02T14:43:53ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362012-09-01192S3643440Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilitiesA. A. PikhtulovD. V. ShevchenkoV. B. HoliavinBluetooth technology is very vulnerable, and there are many ways to use it for malicious activity on your mobile device. The review of the different attacks and the creation of their classification are given in this article. This problem is sufficiently urgent, because the creation of the classifications can be the basis for effective protection of Bluetooth protocol.https://bit.mephi.ru/index.php/bit/article/view/450BluetoothBluetoothattackvulnerabilityvirusclassification |
spellingShingle | A. A. Pikhtulov D. V. Shevchenko V. B. Holiavin Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities Безопасность информационных технологий Bluetooth Bluetooth attack vulnerability virus classification |
title | Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities |
title_full | Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities |
title_fullStr | Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities |
title_full_unstemmed | Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities |
title_short | Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities |
title_sort | analysis and classification of attacks on mobile devices using the bluetooth protocolvulnerabilities |
topic | Bluetooth Bluetooth attack vulnerability virus classification |
url | https://bit.mephi.ru/index.php/bit/article/view/450 |
work_keys_str_mv | AT aapikhtulov analysisandclassificationofattacksonmobiledevicesusingthebluetoothprotocolvulnerabilities AT dvshevchenko analysisandclassificationofattacksonmobiledevicesusingthebluetoothprotocolvulnerabilities AT vbholiavin analysisandclassificationofattacksonmobiledevicesusingthebluetoothprotocolvulnerabilities |