ABSTRACT

Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology   [open pdf - 4MB]

This special publication by the National Institute of Standards and Technology addresses bluetooth security in the context of overall computer network security. "Bluetooth is an open standard for short-range radio frequency (RF) communication. Bluetooth technology is used primarily to establish wireless personal area networks (WPAN), commonly referred to as ad hoc or peer-to-peer (P2P) networks. Bluetooth technology has been integrated into many types of business and consumer devices, including cellular phones, personal digital assistants (PDA), laptops, automobiles, printers, and headsets. This allows users to form ad hoc networks between a wide variety of devices to transfer voice and data. This document provides an overview of Bluetooth technology and discusses related security concerns. […] Bluetooth technology and associated devices are susceptible to general wireless networking threats, such as denial of service attacks, eavesdropping, man-in-the-middle attacks, message modification, and resource misappropriation. They are also threatened by more specific Bluetooth-related attacks that target known vulnerabilities in Bluetooth implementations and specifications. Attacks against improperly secured Bluetooth implementations can provide attackers with unauthorized access to sensitive information and unauthorized usage of Bluetooth devices and other systems or networks to which the devices are connected."

Report Number:
NIST Special Publication 800-121
Author:
Publisher:
Date:
2008-09
Copyright:
Public Domain
Retrieved From:
National Institute of Standards and Technology: http://www.nist.gov/
Format:
pdf
Media Type:
application/pdf
URL:
Help with citations