ABSTRACT

Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology [Revision 1]   [open pdf - 2MB]

"Bluetooth is an open standard for short-range radio frequency (RF) communication. Bluetooth technology is used primarily to establish wireless personal area networks (WPANs). Bluetooth technology has been integrated into many types of business and consumer devices, including cell phones, laptops, automobiles, medical devices, printers, keyboards, mice, and headsets. This allows users to form ad hoc networks between a wide variety of devices to transfer voice and data. This document provides an overview of Bluetooth technology and discusses related security concerns. […] Bluetooth technology and associated devices are susceptible to general wireless networking threats, such as denial of service (DoS) attacks, eavesdropping, man-in-the-middle (MITM) attacks, message modification, and resource misappropriation. They are also threatened by more specific Bluetooth-related attacks that target known vulnerabilities in Bluetooth implementations and specifications. Attacks against improperly secured Bluetooth implementations can provide attackers with unauthorized access to sensitive information and unauthorized use of Bluetooth devices and other systems or networks to which the devices are connected."

Report Number:
National Institute of Standards and Technology Special Publication No. 800-121, Revision 1; NIST Special Publication No. 800-121, Revision 1
Author:
Publisher:
Date:
2012-06
Copyright:
Public Domain
Retrieved From:
National Institute of Standards and Technology: http://www.nist.gov/
Media Type:
application/pdf
URL:
Help with citations