Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities

Bluetooth technology is very vulnerable, and there are many ways to use it for malicious activity on your mobile device. The review of the different attacks and the creation of their classification are given in this article. This problem is sufficiently urgent, because the creation of the classifica...

Full description

Bibliographic Details
Main Authors: A. A. Pikhtulov, D. V. Shevchenko, V. B. Holiavin
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2012-09-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/450
_version_ 1827846608732028928
author A. A. Pikhtulov
D. V. Shevchenko
V. B. Holiavin
author_facet A. A. Pikhtulov
D. V. Shevchenko
V. B. Holiavin
author_sort A. A. Pikhtulov
collection DOAJ
description Bluetooth technology is very vulnerable, and there are many ways to use it for malicious activity on your mobile device. The review of the different attacks and the creation of their classification are given in this article. This problem is sufficiently urgent, because the creation of the classifications can be the basis for effective protection of Bluetooth protocol.
first_indexed 2024-03-12T09:18:23Z
format Article
id doaj.art-d0136fabae9246bc80e8b4c3aca2b866
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T09:18:23Z
publishDate 2012-09-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-d0136fabae9246bc80e8b4c3aca2b8662023-09-02T14:43:53ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362012-09-01192S3643440Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilitiesA. A. PikhtulovD. V. ShevchenkoV. B. HoliavinBluetooth technology is very vulnerable, and there are many ways to use it for malicious activity on your mobile device. The review of the different attacks and the creation of their classification are given in this article. This problem is sufficiently urgent, because the creation of the classifications can be the basis for effective protection of Bluetooth protocol.https://bit.mephi.ru/index.php/bit/article/view/450BluetoothBluetoothattackvulnerabilityvirusclassification
spellingShingle A. A. Pikhtulov
D. V. Shevchenko
V. B. Holiavin
Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities
Безопасность информационных технологий
Bluetooth
Bluetooth
attack
vulnerability
virus
classification
title Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities
title_full Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities
title_fullStr Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities
title_full_unstemmed Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities
title_short Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities
title_sort analysis and classification of attacks on mobile devices using the bluetooth protocolvulnerabilities
topic Bluetooth
Bluetooth
attack
vulnerability
virus
classification
url https://bit.mephi.ru/index.php/bit/article/view/450
work_keys_str_mv AT aapikhtulov analysisandclassificationofattacksonmobiledevicesusingthebluetoothprotocolvulnerabilities
AT dvshevchenko analysisandclassificationofattacksonmobiledevicesusingthebluetoothprotocolvulnerabilities
AT vbholiavin analysisandclassificationofattacksonmobiledevicesusingthebluetoothprotocolvulnerabilities