Bluetooth vulnerabilities on smart phones running in ios and android operating system

Bluetooth technology becomes a part of our daily lives. It is built into a many products such as mobile phones, computers, cars, and medical devices. Moreover, it allows sharing music, photos, videos, and other information wirelessly between two paired devices using radio waves. This technology send...

Full description

Saved in:
Bibliographic Details
Main Author: Fatani, Tariq Abdulaziz D.
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:http://eprints.utm.my/id/eprint/48170/1/TariqAbdulazizDFataniMFC2013.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utm-ep.48170
record_format uketd_dc
spelling my-utm-ep.481702017-08-28T04:00:24Z Bluetooth vulnerabilities on smart phones running in ios and android operating system 2013 Fatani, Tariq Abdulaziz D., TK Electrical engineering. Electronics Nuclear engineering Bluetooth technology becomes a part of our daily lives. It is built into a many products such as mobile phones, computers, cars, and medical devices. Moreover, it allows sharing music, photos, videos, and other information wirelessly between two paired devices using radio waves. This technology sends information within your own personal space, which is called your Personal Area Network or "PAN" at distances less than 10 meters. The Common Vulnerabilities and Exploits (CVE) and National Vulnerability Database have recorded a sharp increase in reported vulnerabilities for several popular Bluetooth software stacks specially in Symbian and J2ME OS. The objective of this research is to find existing Bluetooth vulnerability in iOS and Android OS by using available tools that claim ability to penetrate mobile phone Bluetooth and to find possible (approximately three) preventive measures to eliminate vulnerabilities. The methodology of this research will be preliminary investigation, analysis, test and evaluation. The scenario of the experiment was by installing all attack tools in Backtrack 5r4 and rnu it against the smartphone devices and observe the devices notification along with possible information that has been gathered. The experiments have proved smart phone devices are more protective against different types of attacks because in most of the scenarios, the user has to accept the connection. However the successful attacks for the devices with low interactivity such as Bluetooth headphones revealed that it is possible to inject or record sounds in these devices without authenticated connection. Thus these devices need to have better security mechanism. 2013 Thesis http://eprints.utm.my/id/eprint/48170/ http://eprints.utm.my/id/eprint/48170/1/TariqAbdulazizDFataniMFC2013.pdf application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:81995?queryType=vitalDismax&query=Bluetooth+vulnerabilities+on+smart+phones+running+in+ios+and+android+operating+system&public=true masters Universiti Teknologi Malaysia, Faculty of Computing Faculty of Computing
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic TK Electrical engineering
Electronics Nuclear engineering
spellingShingle TK Electrical engineering
Electronics Nuclear engineering
Fatani, Tariq Abdulaziz D.,
Bluetooth vulnerabilities on smart phones running in ios and android operating system
description Bluetooth technology becomes a part of our daily lives. It is built into a many products such as mobile phones, computers, cars, and medical devices. Moreover, it allows sharing music, photos, videos, and other information wirelessly between two paired devices using radio waves. This technology sends information within your own personal space, which is called your Personal Area Network or "PAN" at distances less than 10 meters. The Common Vulnerabilities and Exploits (CVE) and National Vulnerability Database have recorded a sharp increase in reported vulnerabilities for several popular Bluetooth software stacks specially in Symbian and J2ME OS. The objective of this research is to find existing Bluetooth vulnerability in iOS and Android OS by using available tools that claim ability to penetrate mobile phone Bluetooth and to find possible (approximately three) preventive measures to eliminate vulnerabilities. The methodology of this research will be preliminary investigation, analysis, test and evaluation. The scenario of the experiment was by installing all attack tools in Backtrack 5r4 and rnu it against the smartphone devices and observe the devices notification along with possible information that has been gathered. The experiments have proved smart phone devices are more protective against different types of attacks because in most of the scenarios, the user has to accept the connection. However the successful attacks for the devices with low interactivity such as Bluetooth headphones revealed that it is possible to inject or record sounds in these devices without authenticated connection. Thus these devices need to have better security mechanism.
format Thesis
qualification_level Master's degree
author Fatani, Tariq Abdulaziz D.,
author_facet Fatani, Tariq Abdulaziz D.,
author_sort Fatani, Tariq Abdulaziz D.,
title Bluetooth vulnerabilities on smart phones running in ios and android operating system
title_short Bluetooth vulnerabilities on smart phones running in ios and android operating system
title_full Bluetooth vulnerabilities on smart phones running in ios and android operating system
title_fullStr Bluetooth vulnerabilities on smart phones running in ios and android operating system
title_full_unstemmed Bluetooth vulnerabilities on smart phones running in ios and android operating system
title_sort bluetooth vulnerabilities on smart phones running in ios and android operating system
granting_institution Universiti Teknologi Malaysia, Faculty of Computing
granting_department Faculty of Computing
publishDate 2013
url http://eprints.utm.my/id/eprint/48170/1/TariqAbdulazizDFataniMFC2013.pdf
_version_ 1747817324817154048