Research Article Open Access

Security Manager - Key to Restrict the Attacks in Bluetooth

Pushpa Suri and Sona Rani

Abstract

Bluetooth is the technology that utilizes radio frequency waves as a way to communicate wirelessly between digital devices. The Bluetooth user has the choice of point-to-point or point-to-multipoint links whereby communication can be held between two devices, or up to eight. When devices are communicating with each other they are known as piconet, and each device is designated as a master unit or slave unit, usually depending on who initiates the connection. However, both devices have the potential to be either a master or a slave. We have given the analysis of denial of service attack in the bluetooth technology. And describe the proposed solution for this attack by the use of security manager.

Journal of Computer Science
Volume 3 No. 7, 2007, 546-548

DOI: https://doi.org/10.3844/jcssp.2007.546.548

Submitted On: 12 May 2007 Published On: 31 July 2007

How to Cite: Suri, P. & Rani, S. (2007). Security Manager - Key to Restrict the Attacks in Bluetooth. Journal of Computer Science, 3(7), 546-548. https://doi.org/10.3844/jcssp.2007.546.548

  • 3,022 Views
  • 2,731 Downloads
  • 0 Citations

Download

Keywords

  • bluetooth
  • attack
  • pairing
  • security manager