Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities

Bluetooth technology is very vulnerable, and there are many ways to use it for malicious activity on your mobile device. The review of the different attacks and the creation of their classification are given in this article. This problem is sufficiently urgent, because the creation of the classifica...

Full description

Bibliographic Details
Main Authors: A. A. Pikhtulov, D. V. Shevchenko, V. B. Holiavin
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2012-09-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/450