Coverart for item
The Resource Bluetooth security attacks : comparative analysis, attacks, and countermeasures, Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen, (electronic book)

Bluetooth security attacks : comparative analysis, attacks, and countermeasures, Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen, (electronic book)

Label
Bluetooth security attacks : comparative analysis, attacks, and countermeasures
Title
Bluetooth security attacks
Title remainder
comparative analysis, attacks, and countermeasures
Statement of responsibility
Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Contributor
Author
Subject
Language
eng
Summary
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices
Member of
Cataloging source
GW5XE
Dewey number
004.6/2
Illustrations
illustrations
Index
no index present
LC call number
TK5103.3
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Haataja, Keijo
Series statement
SpringerBriefs in Computer Science,
http://library.link/vocab/subjectName
  • Bluetooth technology
  • Computer networks
Label
Bluetooth security attacks : comparative analysis, attacks, and countermeasures, Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen, (electronic book)
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references
Color
multicolored
Contents
  • Overview of Bluetooth Security
  • Reasons for Bluetooth Network Vulnerabilities
  • Comparative Analysis of Bluetooth Security Attacks
  • MITM Attacks on Bluetooth
  • Countermeasures
  • New Practical Attack
  • Conclusion and Future Work
Control code
SPR864896594
Dimensions
unknown
Extent
1 online resource (vii, 93 pages)
File format
unknown
Form of item
online
Isbn
9783642406461
Level of compression
unknown
Other control number
10.1007/978-3-642-40646-1
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic resource.
Sound
unknown sound
Specific material designation
remote
Label
Bluetooth security attacks : comparative analysis, attacks, and countermeasures, Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen, (electronic book)
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references
Color
multicolored
Contents
  • Overview of Bluetooth Security
  • Reasons for Bluetooth Network Vulnerabilities
  • Comparative Analysis of Bluetooth Security Attacks
  • MITM Attacks on Bluetooth
  • Countermeasures
  • New Practical Attack
  • Conclusion and Future Work
Control code
SPR864896594
Dimensions
unknown
Extent
1 online resource (vii, 93 pages)
File format
unknown
Form of item
online
Isbn
9783642406461
Level of compression
unknown
Other control number
10.1007/978-3-642-40646-1
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic resource.
Sound
unknown sound
Specific material designation
remote

Library Locations

Processing Feedback ...