Thursday, February 21, 2013

Bluetooth Security

Is Bluetooth Secured? What are the Vulnerabilities in Bluetooth?


 Bluetooth introduces a number of potentially serious security vulnerabilities.  


Bluetooth uses optional pre-shared key authentication and encryption algorithms that are  considered strong when both implemented and used correctly. 

The strength of Bluetooth security relies primarily on the length and randomness of the passkey used for Bluetooth pairing, during which devices mutually authenticate each other for the first time and set up a link key for later authentication and encryption.  

Bluetooth is by design a peer-to-peer network technology and typically lacks centralized administration and security enforcement infrastructure. 

Bluetooth Security



No comments:

Post a Comment