Haataja, Keijo
Bluetooth Security Attacks
1. Introduction
Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
2. Overview of Bluetooth Security
Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
3. Reasons for Bluetooth Network Vulnerabilities
Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
4. Comparative Analysis of Bluetooth Security Attacks
Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
5. MITM Attacks on Bluetooth
Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
6. Countermeasures
Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
7. New Practical Attack
Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
8. Conclusion and Future Work
Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen
Keywords: Computer Science, Data Structures, Cryptology and Information Theory, Systems and Data Security, Computer Communication Networks, Security Science and Technology
- Author(s)
- Haataja, Keijo
- Hyppönen, Konstantin
- Pasanen, Sanna
- Toivanen, Pekka
- Publisher
- Springer
- Publication year
- 2013
- Language
- en
- Edition
- 2013
- Series
- SpringerBriefs in Computer Science
- Page amount
- 7 pages
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9783642406461