Eavesdropping in Bluetooth networks

Authors

  • Maruf Farhan Department of Engineering and Computers, Northumbria University, London, UK. Author
  • Nasr Abosata Department of Engineering and Computers, Northumbria University, London, UK. Author

Keywords:

Bluetooth, Security, Eavesdropping, Vulnerability, wireless

Abstract

Bluetooth eavesdropping refers to the unauthorized access and monitoring of Bluetooth communications. This can be done through the use of specialized software and hardware tools that can intercept and analyze Bluetooth traffic. Bluetooth eavesdropping can be used to gain access to sensitive information, such as personal data, login credentials, and financial information, and can also be used to launch attacks on Bluetooth-enabled devices. To prevent Bluetooth eavesdropping, it is important to use strong encryption and authentication methods, as well as to keep Bluetooth-enabled devices in non-discoverable mode when not in use. Additionally, it is important to be aware of the presence of unauthorized devices in the vicinity, and to avoid pairing with unknown devices. This research paper aims to figure out how easy it is to break into Bluetooth networks and listen in on conversations. So, the technical details of this vulnerability will be looked at, as well as how cybercriminals use this type of network intrusion, how it influences network security and the hazards that eavesdropping in Bluetooth networks provides to an organization's networks or other sorts of enterprises.

References

Downloads

Published

2023-02-28

Issue

Section

Articles

How to Cite

Eavesdropping in Bluetooth networks. (2023). International Journal of Current Engineering and Technology, 13(2), 79-85. https://ijcet.evegenis.org/index.php/ijcet/article/view/543