Investigating Bluetooth Vulnerabilities to Defend from Attacks

Nishitkumar Patel, Hayden Wimmer, Carl M. Rebman

Research output: Contribution to book or proceedingConference articlepeer-review

2 Scopus citations

Abstract

Bluetooth devices can be compromised in various ways, which can lead to significant loss of data. In most cases hackers opt for denial service attacks, eavesdropping, resource misappropriation, and message modification. All these bear significant threats in terms of tampering with user data. In the evaluation, this paper used the Kali Linux platform and third-party system tools to test four Bluetooth compromise processes (Bluejacking, bluesmacking, bluesnarfing, and social engineering) on three different Bluetooth devices (HMDX Jam speaker, iPhone 6, and Nexus 7. The results revealed that hackers can execute the attacks without much effort and consequently tamper with information within the system. This paper also investigated how users could implement various protocols to secure their devices to limit the possibility of incurring intrusions from hackers.

Original languageEnglish
Title of host publicationISMSIT 2021 - 5th International Symposium on Multidisciplinary Studies and Innovative Technologies, Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages549-554
Number of pages6
ISBN (Electronic)9781665449304
DOIs
StatePublished - 2021
Event5h International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2021 - Ankara, Turkey
Duration: Oct 21 2021Oct 23 2021

Publication series

NameISMSIT 2021 - 5th International Symposium on Multidisciplinary Studies and Innovative Technologies, Proceedings

Conference

Conference5h International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2021
Country/TerritoryTurkey
CityAnkara
Period10/21/2110/23/21

Scopus Subject Areas

  • Media Technology
  • Control and Optimization
  • Instrumentation
  • Safety, Risk, Reliability and Quality
  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems and Management

Keywords

  • Bluejacking
  • bluesmacking
  • bluesnarfing
  • Bluetooth attacks
  • social engineering
  • vulnerabilities

Fingerprint

Dive into the research topics of 'Investigating Bluetooth Vulnerabilities to Defend from Attacks'. Together they form a unique fingerprint.

Cite this