TY - BOOK AU - Haataja,Keijo AU - Hyppönen,Konstantin AU - Pasanen,Sanna AU - Toivanen,Pekka ED - SpringerLink (Online service) TI - Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures T2 - SpringerBriefs in Computer Science, SN - 9783642406461 AV - QA76.9.D35 U1 - 005.74 23 PY - 2013/// CY - Berlin, Heidelberg PB - Springer Berlin Heidelberg, Imprint: Springer KW - Computer science KW - Computer communication systems KW - Computer security KW - Data structures (Computer science) KW - System safety KW - Computer Science KW - Data Structures, Cryptology and Information Theory KW - Systems and Data Security KW - Computer Communication Networks KW - Security Science and Technology N1 - Chap. 1 - Introduction -- Chap. 2 - Overview of Bluetooth Security -- Chap. 3 - Bluetooth Network Vulnerabilities -- Chap. 4 - Comparative Analysis of Bluetooth Security Attacks -- Chap. 5 - Meet-in-the-Middle (MITM) Attacks on Bluetooth -- Chap. 6 - Countermeasures -- Chap. 7 - New Practical Attack -- Chap. 8 - Conclusion and Future Work References N2 - Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices UR - http://dx.doi.org/10.1007/978-3-642-40646-1 ER -