Bluetooth Security Attacks

Comparative Analysis, Attacks, and Countermeasures

Nonfiction, Computers, Advanced Computing, Theory, Networking & Communications, Computer Security, General Computing
Cover of the book Bluetooth Security Attacks by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen, Springer Berlin Heidelberg
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen ISBN: 9783642406461
Publisher: Springer Berlin Heidelberg Publication: October 28, 2013
Imprint: Springer Language: English
Author: Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
ISBN: 9783642406461
Publisher: Springer Berlin Heidelberg
Publication: October 28, 2013
Imprint: Springer
Language: English

Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions.

The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions.

The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.

More books from Springer Berlin Heidelberg

Cover of the book Molecular Electronic Structures of Transition Metal Complexes II by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Cover of the book Computer Reformations of the Brain and Skull Base by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Cover of the book Fiber-Optic Transmission Networks by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Cover of the book Thermodynamik kompakt - Formeln und Aufgaben by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Cover of the book Brückenkurs Mathematik by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Cover of the book Molecular Imaging of the Brain by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Cover of the book Coronary Circulation and Myocardial Ischemia by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Cover of the book Competition on the Internet by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Cover of the book Heart and Coronary Arteries by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Cover of the book Setting Up Wholly Foreign Owned Enterprises in China by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Cover of the book Endocrine Surgery in Children by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Cover of the book Interconnected Power Systems by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Cover of the book Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 4 by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Cover of the book Theory of Quantum Computation, Communication, and Cryptography by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Cover of the book Applied Ethics in Management by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy