Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures by Keijo HaatajaBluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures by Keijo Haataja

Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures

byKeijo Haataja, Konstantin Hyppönen, Sanna Pasanen

Paperback | November 12, 2013

Pricing and Purchase Info


Earn 485 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions.

The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.

Dr. Keijo Haataja received his Ph.Lic. in 2007 and his Ph.D. in 2009 in Computer Science from the University of Eastern Finland (UEF), where he has been a senior assistant professor of wireless communications and data security since 2002. He is a member of the Bluetooth Security Expert Group (SEG), which works to identify threats to Bl...
Title:Bluetooth Security Attacks: Comparative Analysis, Attacks, and CountermeasuresFormat:PaperbackDimensions:93 pagesPublished:November 12, 2013Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3642406459

ISBN - 13:9783642406454

Look for similar items by category:


Table of Contents

Chap. 1 - Introduction.- Chap. 2 - Overview of Bluetooth Security.- Chap. 3 - Bluetooth Network Vulnerabilities.- Chap. 4 - Comparative Analysis of Bluetooth Security Attacks.- Chap. 5 - Meet-in-the-Middle (MITM) Attacks on Bluetooth.- Chap. 6 - Countermeasures.- Chap. 7 - New Practical Attack.- Chap. 8 - Conclusion and Future Work References.