Bluetooth network vulnerability

This is an excellent article on Bluetooth network attacks and countermeasures. This article is written by MSc Keijo Haataja from the Department of CS, University of Kuopio, Finland. Article is useful for anyone who has already have some knowledge on bluetooh security and it’s issues.

Features:

  • Talks about well known attacks, lesser known attacks and experimental attacks using bluetooth.
  • Explores countermeasures to the attackes

  • Good recommendation for bluetooth security
  • Easy to read diagrams to clarify concepts