Bluetooth vulnerabilities on smart phones running in ios and android operating system

Bluetooth technology becomes a part of our daily lives. It is built into a many products such as mobile phones, computers, cars, and medical devices. Moreover, it allows sharing music, photos, videos, and other information wirelessly between two paired devices using radio waves. This technology send...

Full description

Saved in:
Bibliographic Details
Main Author: Fatani, Tariq Abdulaziz D.,
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:http://eprints.utm.my/id/eprint/48170/1/TariqAbdulazizDFataniMFC2013.pdf
http://eprints.utm.my/id/eprint/48170/
http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:81995?queryType=vitalDismax&query=Bluetooth+vulnerabilities+on+smart+phones+running+in+ios+and+android+operating+system&public=true
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.48170
record_format eprints
spelling my.utm.481702017-08-28T04:00:24Z http://eprints.utm.my/id/eprint/48170/ Bluetooth vulnerabilities on smart phones running in ios and android operating system Fatani, Tariq Abdulaziz D., TK Electrical engineering. Electronics Nuclear engineering Bluetooth technology becomes a part of our daily lives. It is built into a many products such as mobile phones, computers, cars, and medical devices. Moreover, it allows sharing music, photos, videos, and other information wirelessly between two paired devices using radio waves. This technology sends information within your own personal space, which is called your Personal Area Network or "PAN" at distances less than 10 meters. The Common Vulnerabilities and Exploits (CVE) and National Vulnerability Database have recorded a sharp increase in reported vulnerabilities for several popular Bluetooth software stacks specially in Symbian and J2ME OS. The objective of this research is to find existing Bluetooth vulnerability in iOS and Android OS by using available tools that claim ability to penetrate mobile phone Bluetooth and to find possible (approximately three) preventive measures to eliminate vulnerabilities. The methodology of this research will be preliminary investigation, analysis, test and evaluation. The scenario of the experiment was by installing all attack tools in Backtrack 5r4 and rnu it against the smartphone devices and observe the devices notification along with possible information that has been gathered. The experiments have proved smart phone devices are more protective against different types of attacks because in most of the scenarios, the user has to accept the connection. However the successful attacks for the devices with low interactivity such as Bluetooth headphones revealed that it is possible to inject or record sounds in these devices without authenticated connection. Thus these devices need to have better security mechanism. 2013 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/id/eprint/48170/1/TariqAbdulazizDFataniMFC2013.pdf Fatani, Tariq Abdulaziz D., (2013) Bluetooth vulnerabilities on smart phones running in ios and android operating system. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computing. http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:81995?queryType=vitalDismax&query=Bluetooth+vulnerabilities+on+smart+phones+running+in+ios+and+android+operating+system&public=true
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic TK Electrical engineering. Electronics Nuclear engineering
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
Fatani, Tariq Abdulaziz D.,
Bluetooth vulnerabilities on smart phones running in ios and android operating system
description Bluetooth technology becomes a part of our daily lives. It is built into a many products such as mobile phones, computers, cars, and medical devices. Moreover, it allows sharing music, photos, videos, and other information wirelessly between two paired devices using radio waves. This technology sends information within your own personal space, which is called your Personal Area Network or "PAN" at distances less than 10 meters. The Common Vulnerabilities and Exploits (CVE) and National Vulnerability Database have recorded a sharp increase in reported vulnerabilities for several popular Bluetooth software stacks specially in Symbian and J2ME OS. The objective of this research is to find existing Bluetooth vulnerability in iOS and Android OS by using available tools that claim ability to penetrate mobile phone Bluetooth and to find possible (approximately three) preventive measures to eliminate vulnerabilities. The methodology of this research will be preliminary investigation, analysis, test and evaluation. The scenario of the experiment was by installing all attack tools in Backtrack 5r4 and rnu it against the smartphone devices and observe the devices notification along with possible information that has been gathered. The experiments have proved smart phone devices are more protective against different types of attacks because in most of the scenarios, the user has to accept the connection. However the successful attacks for the devices with low interactivity such as Bluetooth headphones revealed that it is possible to inject or record sounds in these devices without authenticated connection. Thus these devices need to have better security mechanism.
format Thesis
author Fatani, Tariq Abdulaziz D.,
author_facet Fatani, Tariq Abdulaziz D.,
author_sort Fatani, Tariq Abdulaziz D.,
title Bluetooth vulnerabilities on smart phones running in ios and android operating system
title_short Bluetooth vulnerabilities on smart phones running in ios and android operating system
title_full Bluetooth vulnerabilities on smart phones running in ios and android operating system
title_fullStr Bluetooth vulnerabilities on smart phones running in ios and android operating system
title_full_unstemmed Bluetooth vulnerabilities on smart phones running in ios and android operating system
title_sort bluetooth vulnerabilities on smart phones running in ios and android operating system
publishDate 2013
url http://eprints.utm.my/id/eprint/48170/1/TariqAbdulazizDFataniMFC2013.pdf
http://eprints.utm.my/id/eprint/48170/
http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:81995?queryType=vitalDismax&query=Bluetooth+vulnerabilities+on+smart+phones+running+in+ios+and+android+operating+system&public=true
_version_ 1643652481359544320
score 13.160551