Thesis
Thesis
net/publication/369941465
CITATIONS READS
0 4,968
1 author:
Fatin Israq
Independent University, Bangladesh
4 PUBLICATIONS 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Fatin Israq on 11 April 2023.
Dhaka, Bangladesh
Email: [email protected],
Adopted protocol:
Telephony protocol:
X. BLUETOOTH PREVENTION
IX. RISK MITIGATION AND MEASURES
COUNTERMEASURE
Always keep physical control of your
By applying countermeasures to devices. Remove devices that have been missing
prevent threats and vulnerabilities risk or stolen from paired device lists.
mitigation can be achieved. Organizations who
are using Bluetooth should address document Avoid using the Bluetooth-enabled device
security policies. The policies should also to interact or transfer confidential or personal
include a proper password usage scheme. information, as it could be sniffed.
Organizations should include educational
awareness-based knowledge to provide an When connecting your Bluetooth device
adequate level of knowledge for those who will to your PC, enable encryption. [14]
deal with Bluetooth-enabled devices. Some of
the risk mitigation techniques and To keep up with the latest viruses and
countermeasures are given below:- Trojans, update your device antivirus on a
regular basis.
To achieve optimal standards default Security Mode 3 is strongly
settings should be updated. recommended for the highest level of security.
Security mode 3 is enforced at the connection
PIN codes have to be random and long. level to give the highest security.
Using long and random PIN codes
makes it harder for the attackers to XI. CONCLUSION
hack.
This paper covers up different vital themes such as
Bluetooth devices have to be set to the a few foundation data related to the Bluetooth
lowest power to secure transmission system, its applications, how it works and different
within a safe perimeter of the desired security issues included in Bluetooth. We talked
network. about vulnerabilities in different versions of
Bluetooth, as well as a bunch of new Bluetooth
Devices should be discoverable only security attacks. Most of which arise from the
for a short period of time to pair with pairing phase. Bluetooth risk mitigation and
the desired devices. Devices that are countermeasures were also researched in this paper.
discoverable and connectable all the
Bluetooth security experts need to research more
time are prone to attack.
and update their technologies frequently to stand
against Bluetooth vulnerabilities.
REFERENCES
[2] S. S. B. K. Madhvi Verma, An Overview of Bluetooth Technology and its Communication, vol. 3,
2015.
[5] Y.-W. B. a. M.-B. L. Chia-Hung Lien, "Remote-Controllable Power Outlet System for Home
Power Management," vol. 53, 2007.
[11] "Security Vulnerabilities in Bluetooth Technology as Used in IoT," journal of sensor and Actuator
Networks, 2018.
[12] P. k. mishra, "Bluetooth Security Threats," International Journal of Computer Science &
Engineering, vol. 4, 2013.
[13] M. T. Nateq Be-Nazir Ibn Minar, "BLUETOOTH SECURITY THREATS AND SOLUTIONSs:
A SURVEY," International Journal of Distributed and Parallel Systems (IJDPS), vol. 3, 2012.
[14] T. P. P. Panse, "A Survey on Security Threats and Vulnerability attacks on Bluetooth
Communication," (IJCSIT) International Journal of Computer Science and Information
Technologies, vol. 4(5), 2013.