Intrusion detection in bluetooth enabled mobile phones
Nair, Kishor Krishnan
MetadataShow full item record
Wireless technology has become one of the vital media of communication and Bluetooth is playing a major role in advancing its global spread, connecting electronic devices worldwide without cables. Bluetooth is recognized and globally accepted mainly through Bluetooth enabled mobile phones, which cover almost 60% of the Bluetooth market. However, with other technological innovations, the advancement in Bluetooth enabled mobile phones also caused serious security breaches. Although Bluetooth mobile phones are equipped with built-in security modes and policies, the intruders compromise the mobile phones through existing security vulnerabilities and limitations. Information stored in mobile phones, whether it is personal or corporate, is valuable to mobile phone users. Such information also seeks the attention of intruders. Moreover, an intruder can compromise the mobile phone, and use it as a medium to get into other mobile phones. Mobile phone users are unaware of this current dilemma. Therefore, the need to protect information, as well as mobile phone users to supervise their incoming connections, is very vital. An additional security mechanism was therefore realized, especially at the mobile phone's user level, and which could be useful to the mobile phone users. Bluetooth Logging Agent (BLA) is such a mechanism. It helps in alleviating the current security issues by making the users aware of their incoming Bluetooth connections and giving them an option to either accept or reject these connections. Besides this, the intrusion detection and verification module uses databases and rules to authenticate and verify all connections. The BLA when comparing to the existing security solutions is unique in that; it is equipped with a Bluetooth message logging module. This logging module reduces the security risks by monitoring the Bluetooth communication between the mobile phone and the remote device.
- ETD@PUK