{"title":"可穿戴计算应用中的蓝牙安全","authors":"R. Bouhenguel, I. Mahgoub, M. Ilyas","doi":"10.1109/HONET.2008.4810232","DOIUrl":null,"url":null,"abstract":"Advances in wireless sensor networking technologies have been extended to wearable computing systems and opened a plethora of applications and opportunities in the development and integration of pervasive Bluetooth Technologies with the abundance of existing specialized technologies in monitoring, data collection, and real-time analysis and reporting. Although the Bluetooth framework is acceptably secure, there are still a number of weaknesses in the Bluetooth technology. The nature of the wireless ad hoc and the device addressing schemes still make the Bluetooth protocol vulnerable to possible attacks and risks. This paper analyzes some of the vulnerabilities of Bluetooth architecture to possible attacks and risks and the best practices and countermeasures needed to thwart these attacks that target Bluetooth devices and their attached networks. It concentrates on Bluetooth technology security issues and challenges that face wireless computing systems.","PeriodicalId":433243,"journal":{"name":"2008 International Symposium on High Capacity Optical Networks and Enabling Technologies","volume":"196 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"50","resultStr":"{\"title\":\"Bluetooth Security in Wearable Computing Applications\",\"authors\":\"R. Bouhenguel, I. Mahgoub, M. Ilyas\",\"doi\":\"10.1109/HONET.2008.4810232\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Advances in wireless sensor networking technologies have been extended to wearable computing systems and opened a plethora of applications and opportunities in the development and integration of pervasive Bluetooth Technologies with the abundance of existing specialized technologies in monitoring, data collection, and real-time analysis and reporting. Although the Bluetooth framework is acceptably secure, there are still a number of weaknesses in the Bluetooth technology. The nature of the wireless ad hoc and the device addressing schemes still make the Bluetooth protocol vulnerable to possible attacks and risks. This paper analyzes some of the vulnerabilities of Bluetooth architecture to possible attacks and risks and the best practices and countermeasures needed to thwart these attacks that target Bluetooth devices and their attached networks. It concentrates on Bluetooth technology security issues and challenges that face wireless computing systems.\",\"PeriodicalId\":433243,\"journal\":{\"name\":\"2008 International Symposium on High Capacity Optical Networks and Enabling Technologies\",\"volume\":\"196 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"50\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Symposium on High Capacity Optical Networks and Enabling Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HONET.2008.4810232\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposium on High Capacity Optical Networks and Enabling Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HONET.2008.4810232","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Bluetooth Security in Wearable Computing Applications
Advances in wireless sensor networking technologies have been extended to wearable computing systems and opened a plethora of applications and opportunities in the development and integration of pervasive Bluetooth Technologies with the abundance of existing specialized technologies in monitoring, data collection, and real-time analysis and reporting. Although the Bluetooth framework is acceptably secure, there are still a number of weaknesses in the Bluetooth technology. The nature of the wireless ad hoc and the device addressing schemes still make the Bluetooth protocol vulnerable to possible attacks and risks. This paper analyzes some of the vulnerabilities of Bluetooth architecture to possible attacks and risks and the best practices and countermeasures needed to thwart these attacks that target Bluetooth devices and their attached networks. It concentrates on Bluetooth technology security issues and challenges that face wireless computing systems.