Bluetooth vulnerabilities on smart phones running in ios and android operating system
Bluetooth technology becomes a part of our daily lives. It is built into a many products such as mobile phones, computers, cars, and medical devices. Moreover, it allows sharing music, photos, videos, and other information wirelessly between two paired devices using radio waves. This technology send...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/48170/1/TariqAbdulazizDFataniMFC2013.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-utm-ep.48170 |
---|---|
record_format |
uketd_dc |
spelling |
my-utm-ep.481702017-08-28T04:00:24Z Bluetooth vulnerabilities on smart phones running in ios and android operating system 2013 Fatani, Tariq Abdulaziz D., TK Electrical engineering. Electronics Nuclear engineering Bluetooth technology becomes a part of our daily lives. It is built into a many products such as mobile phones, computers, cars, and medical devices. Moreover, it allows sharing music, photos, videos, and other information wirelessly between two paired devices using radio waves. This technology sends information within your own personal space, which is called your Personal Area Network or "PAN" at distances less than 10 meters. The Common Vulnerabilities and Exploits (CVE) and National Vulnerability Database have recorded a sharp increase in reported vulnerabilities for several popular Bluetooth software stacks specially in Symbian and J2ME OS. The objective of this research is to find existing Bluetooth vulnerability in iOS and Android OS by using available tools that claim ability to penetrate mobile phone Bluetooth and to find possible (approximately three) preventive measures to eliminate vulnerabilities. The methodology of this research will be preliminary investigation, analysis, test and evaluation. The scenario of the experiment was by installing all attack tools in Backtrack 5r4 and rnu it against the smartphone devices and observe the devices notification along with possible information that has been gathered. The experiments have proved smart phone devices are more protective against different types of attacks because in most of the scenarios, the user has to accept the connection. However the successful attacks for the devices with low interactivity such as Bluetooth headphones revealed that it is possible to inject or record sounds in these devices without authenticated connection. Thus these devices need to have better security mechanism. 2013 Thesis http://eprints.utm.my/id/eprint/48170/ http://eprints.utm.my/id/eprint/48170/1/TariqAbdulazizDFataniMFC2013.pdf application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:81995?queryType=vitalDismax&query=Bluetooth+vulnerabilities+on+smart+phones+running+in+ios+and+android+operating+system&public=true masters Universiti Teknologi Malaysia, Faculty of Computing Faculty of Computing |
institution |
Universiti Teknologi Malaysia |
collection |
UTM Institutional Repository |
language |
English |
topic |
TK Electrical engineering Electronics Nuclear engineering |
spellingShingle |
TK Electrical engineering Electronics Nuclear engineering Fatani, Tariq Abdulaziz D., Bluetooth vulnerabilities on smart phones running in ios and android operating system |
description |
Bluetooth technology becomes a part of our daily lives. It is built into a many products such as mobile phones, computers, cars, and medical devices. Moreover, it allows sharing music, photos, videos, and other information wirelessly between two paired devices using radio waves. This technology sends information within your own personal space, which is called your Personal Area Network or "PAN" at distances less than 10 meters. The Common Vulnerabilities and Exploits (CVE) and National Vulnerability Database have recorded a sharp increase in reported vulnerabilities for several popular Bluetooth software stacks specially in Symbian and J2ME OS. The objective of this research is to find existing Bluetooth vulnerability in iOS and Android OS by using available tools that claim ability to penetrate mobile phone Bluetooth and to find possible (approximately three) preventive measures to eliminate vulnerabilities. The methodology of this research will be preliminary investigation, analysis, test and evaluation. The scenario of the experiment was by installing all attack tools in Backtrack 5r4 and rnu it against the smartphone devices and observe the devices notification along with possible information that has been gathered. The experiments have proved smart phone devices are more protective against different types of attacks because in most of the scenarios, the user has to accept the connection. However the successful attacks for the devices with low interactivity such as Bluetooth headphones revealed that it is possible to inject or record sounds in these devices without authenticated connection. Thus these devices need to have better security mechanism. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Fatani, Tariq Abdulaziz D., |
author_facet |
Fatani, Tariq Abdulaziz D., |
author_sort |
Fatani, Tariq Abdulaziz D., |
title |
Bluetooth vulnerabilities on smart phones running in ios and android operating system |
title_short |
Bluetooth vulnerabilities on smart phones running in ios and android operating system |
title_full |
Bluetooth vulnerabilities on smart phones running in ios and android operating system |
title_fullStr |
Bluetooth vulnerabilities on smart phones running in ios and android operating system |
title_full_unstemmed |
Bluetooth vulnerabilities on smart phones running in ios and android operating system |
title_sort |
bluetooth vulnerabilities on smart phones running in ios and android operating system |
granting_institution |
Universiti Teknologi Malaysia, Faculty of Computing |
granting_department |
Faculty of Computing |
publishDate |
2013 |
url |
http://eprints.utm.my/id/eprint/48170/1/TariqAbdulazizDFataniMFC2013.pdf |
_version_ |
1747817324817154048 |