Is Bluetooth Secured? What are the Vulnerabilities in Bluetooth?
Bluetooth introduces a number of
potentially serious security vulnerabilities.
Bluetooth uses optional pre-shared key authentication
and encryption algorithms that are considered strong when
both implemented and used correctly.
The strength of Bluetooth security relies
primarily on the length and randomness of the passkey used for Bluetooth
pairing, during which devices mutually authenticate each other for the first
time and set up a link key for later authentication and encryption.
Bluetooth is by design a peer-to-peer network
technology and typically lacks centralized administration and security
enforcement infrastructure.
No comments:
Post a Comment