CFP last date
20 January 2025
Reseach Article

A Secured Bluetooth Based Social Network

by Nateq Be-Nazir Ibn Minar, Mohammed Tarique
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 26 - Number 1
Year of Publication: 2011
Authors: Nateq Be-Nazir Ibn Minar, Mohammed Tarique
10.5120/3069-4196

Nateq Be-Nazir Ibn Minar, Mohammed Tarique . A Secured Bluetooth Based Social Network. International Journal of Computer Applications. 26, 1 ( July 2011), 16-22. DOI=10.5120/3069-4196

@article{ 10.5120/3069-4196,
author = { Nateq Be-Nazir Ibn Minar, Mohammed Tarique },
title = { A Secured Bluetooth Based Social Network },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 26 },
number = { 1 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 16-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume26/number1/3069-4196/ },
doi = { 10.5120/3069-4196 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:11:40.961791+05:30
%A Nateq Be-Nazir Ibn Minar
%A Mohammed Tarique
%T A Secured Bluetooth Based Social Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 26
%N 1
%P 16-22
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Bluetooth is a technology for short range wireless real-time data transfer between devices. It is becoming increasingly more prevalent in modern society, with technical gadgets now ranging from mobile phones and game controllers to PDAs and personal computers. In Bangladesh, use of technology has not reached its maximum potential and it is yet to spread among the majority of population and devices like PDA/Smart phones/Laptops that consist of WLAN feature is not widely used in public environments. But the use of basic mobile phones (consisting of Bluetooth feature) is greatly increasing over the years. This paper proposes a way to implement the Bluetooth Standard as a communication medium for a social network like a university in order to send and receive valuable information and services which can be used as a cheaper solution and replacement to WLAN devices. However, Bluetooth has security threats too; hence this paper also addresses the potential weaknesses and vulnerabilities in security protocols of this technology so that protection against malicious attacks, identity theft and eavesdropping can be insured. Due to the public nature of this network some application level security features have been incorporated to make it a safer network. Finally, the paper concludes with some recommendations for the future works regarding this Bluetooth networking concept.

References
  1. Bluetooth Special Interest Group. https://www.bluetooth.org/About/bluetooth_sig.htm
  2. Bluetooth SIG, Specification of the Bluetooth System: Volume 1, Core, Version 1.1, Feb. 22, 2001.
  3. Bluetooth SIG, Specification of the Bluetooth System: Volume 2, Profile, Version 1.1, Feb. 22, 2001.
  4. Bluetooth Special Interest Group, “Simple Pairing White Paper”, V10r00, August 2006, http:// bluetooth.com /NR/rdonlyres/0A0B3F36-D15F -4470-85A6-F2CCFA26F70F/0/SimplePairing_WP_ V10r00.pdf
  5. "How Bluetooth Works" http://en.kioskea.net/contents/bluetooth/bluetooth-fonctionnement.php3.
  6. Jochen Schiller, “Mobile Communications” (second edition), Addison Wesley Publications, 2003. pp. 290, 292, 316.
  7. Haataja, Keijo, “Security Threats and Countermeasures in Bluetooth-Enabled Systems”, Kuopio University Library, 2009, Department of Computer Science, Kuopio, FINLAND. pp. 66-67.
  8. Christian Gehrmann Christian,” Bluetooth Security White Paper”, Bluetooth Special Interest Group,April 2002.
  9. C. Gehrmann, J. Persson, and B. Smeets, “Bluetooth Security”, Computer Security Series, Artech House, 2004.
  10. Y. Lu, W. Meier, and S. Vaudenay, “The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption”, In the Proceedings of The 25th Annual International Cryptology Conference, Santa Barbara, California, August 2005. pp. 97-117.
  11. Marek Bialoglowy, “Bluetooth Security Review, Part 2”. http://www.securityfocus.com/infocus/1836
  12. Mark Rowe, Tim Hurman,” Bluetooth Security Issues, Threats and Consequences”, Pentest Limited. http://www.pentest.co.uk/documents/wbf_slides.pdf
  13. Juha T. Vainio, “Bluetooth Security”, Helsinki University of Technology, September 2010 http://www.niksula.cs.hut.fi/~jiitv/bluesec.html
  14. Korzeniowski, Paul. 2005, “Bluetooth Security Threats Starting to Spread”, TechNewsWorld, February 02, 2005
  15. Kotadia, Munir, “Bluesnarfing tools spreading quickly”, ZDNet, February 17, 2004, http://news.zdnet.co.uk/internet/security/0,39020375,39146427,00.htm
  16. Adam Laurie, “The BlueBug”, A.L. Digital Ltd http://trifinite.org/trifinite_stuff_bluebug.html
  17. John Oates, “Virus attacks mobiles via Bluetooth”, http://www.theregister.co.uk/2004/06/15/symbian_virus/
  18. F-Secure Article on Lasco.A Worm http://www.f-secure.com/v-descs/lasco_a.shtml
  19. Ford-Long Wong, Frank Stajano, Jolyon Clulow, “Repairing the Bluetooth pairing protocol”. University of Cambridge Computer Laboratory. http://www.cl.cam.ac.uk/research/dtg/~fw242/publica tions/2005-WongStaClu-bluetooth.pdf
  20. “Phone pirates in seek and steal mission", Cambridge Evening News. http://www.cambridge-news.co.uk/news/region_wide/ 2005/08/17/06967453-8002-45f8-b520-66b9bed6f29f.lpf
  21. "Going Around with Bluetooth in Full Safety”, F-Secure. http://www.securenetwork.it/ricerca/whitepaper/download/bluebag_brochure.pdf
  22. Y. Shaked and A. Wool, “Cracking the Bluetooth PIN”, In Proceedings of the 3rd USENIX/ACM Conference on Mobile Systems, Applications, and Services (MobiSys), Seattle, WA, June 2005, pp. 39-50.
  23. Keijo Haataja, “Security Threats and Countermeasures in Bluetooth-Enabled Systems”, Kuopio University Library, 2009. pp. 68-80.
  24. Colleen Rhodes, “Bluetooth Security”, East Carolina University, pp. 6-9.
  25. Karen Scarfone and John Padgette, (Bluetooth Threats) - “Guide to Bluetooth Security”, Computer Security Division - National Institute of Standards and Technology, US Department of Commerce, 2008. pp. 25, 26.
  26. Prof. Raquel Hill and Billy Falotico, “Bluetooth Wireless Technology Security Threats and Vulnerabilities”, Indiana University Bloomington, 2008. pp. 7, 8.
  27. Malik Zaka Ullah, “An Analysis of the Bluetooth Technology”, Blekinge Institute of Technology Sweden, 2009. pp. 40-44.
  28. Sailesh Rathi, “Bluetooth Protocol Architecture”, Microware Architect, Microware Systems Corporation. http://www.omimo.be/magazine/00q4/2000q4_p028.pdf
  29. SENA Technologies - a leading manufacturer of Bluetooth Access Points – company profile and portal. http://www.sena.com/products/industrial_bluetooth/msp1000.php
  30. Lamm, Gregory, Gerlando Faluato, Jorge Estrada, Jag Gadiyaram. "Bluetooth Wireless Networks Security Features." In the Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 5-6 June, 2001, pp. 265-272.
Index Terms

Computer Science
Information Sciences

Keywords

Bluetooth network Bluetooth security university network social network wireless networking