Bluetooth: Operation and Use
Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Proceedings of the 3rd international conference on Mobile systems, applications, and services
BlueSniff: Eve meets Alice and Bluetooth
WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies
Designing and implementing an intelligent bluetooth-enabled robot car
WOCN'09 Proceedings of the Sixth international conference on Wireless and Optical Communications Networks
Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
IEEE Transactions on Wireless Communications
Hi-index | 0.00 |
In this paper, we investigate how various Bluetooth security attacks in progress can be prevented and stopped by monitoring communication for discovery of such attacks. Moreover, we propose an idea of the new efficient Intrusion Detection and Prevention System for Bluetooth networks to prevent attacks in progress. Proposed system is based on the set of rules that are used to identify strange communication behaviour of Bluetooth devices.