ResearchSpace

Intrusion Detection in Bluetooth Enabled Mobile Phones

Show simple item record

dc.contributor.author Nair, Kishor K
dc.contributor.author Helberg, Albert
dc.contributor.author Van der Merwe, Johannes J
dc.date.accessioned 2016-11-30T13:56:41Z
dc.date.available 2016-11-30T13:56:41Z
dc.date.issued 2015-11-23
dc.identifier.citation Nair, K.K., Helberg, A. & Van der Merwe, J.J. 2015. Intrusion Detection in Bluetooth Enabled Mobile Phones. http://hdl.handle.net/10204/8878 en_ZA
dc.identifier.other 10.1109/ISSA.2015.7335048
dc.identifier.uri http://hdl.handle.net/10204/8878
dc.description.abstract Bluetooth plays a major role in expanding global spread of wireless technology. This predominantly happens through Bluetooth enabled mobile phones, which cover almost 60% of the Bluetooth market. Although Bluetooth mobile phones are equipped with built-in security modes and policies, intruders compromise mobile phones through existing security vulnerabilities and limitations. Information stored in mobile phones, whether it is personal or corporate, is significant to mobile phone users. Hence, the need to protect information, as well as alert mobile phone users of their incoming connections, is vital. An additional security mechanism was therefore conceptualized, at the mobile phone's user level, which is essential in improving the security. Bluetooth Logging Agent (BLA) is a mechanism that has been developed for this purpose. It alleviates the current security issues by making the users aware of their incoming Bluetooth connections and gives them an option to either accept or reject these connections. Besides this, the intrusion detection and verification module uses databases and rules to authenticate and verify all connections. BLA when compared to the existing security solutions is novel and unique in that it is equipped with a Bluetooth message logging module. This logging module reduces the security risks by monitoring the Bluetooth communication between the mobile phone and the remote device. en_US
dc.description.sponsorship NWU-Potchefstroom en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.subject Vulnerability en_US
dc.subject Bluetooth en_US
dc.subject BLA en_US
dc.subject BD_ADDRESS en_US
dc.subject Pairing en_US
dc.subject Mobile phones en_US
dc.title Intrusion Detection in Bluetooth Enabled Mobile Phones en_US
dc.type Article
dc.identifier.apacitation Nair, K. K., Helberg, A., & Van der Merwe, J. J. (2015). Intrusion Detection in Bluetooth Enabled Mobile Phones. http://hdl.handle.net/10204/8878 en_ZA
dc.identifier.chicagocitation Nair, Kishor K, Albert Helberg, and Johannes J Van der Merwe "Intrusion Detection in Bluetooth Enabled Mobile Phones." (2015) http://hdl.handle.net/10204/8878 en_ZA
dc.identifier.vancouvercitation Nair KK, Helberg A, Van der Merwe JJ. Intrusion Detection in Bluetooth Enabled Mobile Phones. 2015; http://hdl.handle.net/10204/8878. en_ZA
dc.identifier.ris TY - Article AU - Nair, Kishor K AU - Helberg, Albert AU - Van der Merwe, Johannes J AB - Bluetooth plays a major role in expanding global spread of wireless technology. This predominantly happens through Bluetooth enabled mobile phones, which cover almost 60% of the Bluetooth market. Although Bluetooth mobile phones are equipped with built-in security modes and policies, intruders compromise mobile phones through existing security vulnerabilities and limitations. Information stored in mobile phones, whether it is personal or corporate, is significant to mobile phone users. Hence, the need to protect information, as well as alert mobile phone users of their incoming connections, is vital. An additional security mechanism was therefore conceptualized, at the mobile phone's user level, which is essential in improving the security. Bluetooth Logging Agent (BLA) is a mechanism that has been developed for this purpose. It alleviates the current security issues by making the users aware of their incoming Bluetooth connections and gives them an option to either accept or reject these connections. Besides this, the intrusion detection and verification module uses databases and rules to authenticate and verify all connections. BLA when compared to the existing security solutions is novel and unique in that it is equipped with a Bluetooth message logging module. This logging module reduces the security risks by monitoring the Bluetooth communication between the mobile phone and the remote device. DA - 2015-11-23 DB - ResearchSpace DP - CSIR KW - Vulnerability KW - Bluetooth KW - BLA KW - BD_ADDRESS KW - Pairing KW - Mobile phones LK - https://researchspace.csir.co.za PY - 2015 T1 - Intrusion Detection in Bluetooth Enabled Mobile Phones TI - Intrusion Detection in Bluetooth Enabled Mobile Phones UR - http://hdl.handle.net/10204/8878 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record