mirage

Intrusion detection in bluetooth enabled mobile phones / Kishor K. Nair

Boloka/Manakin Repository

Show simple item record

dc.contributor.author Nair, Kishor Krishnan
dc.date.accessioned 2009-11-17T10:03:06Z
dc.date.available 2009-11-17T10:03:06Z
dc.date.issued 2008
dc.identifier.uri http://hdl.handle.net/10394/2560
dc.description Thesis (M.Ing. (Computer and Electronical Engineering))--North-West University, Potchefstroom Campus, 2009.
dc.description.abstract Wireless technology has become one of the vital media of communication and Bluetooth is playing a major role in advancing its global spread, connecting electronic devices worldwide without cables. Bluetooth is recognized and globally accepted mainly through Bluetooth enabled mobile phones, which cover almost 60% of the Bluetooth market. However, with other technological innovations, the advancement in Bluetooth enabled mobile phones also caused serious security breaches. Although Bluetooth mobile phones are equipped with built-in security modes and policies, the intruders compromise the mobile phones through existing security vulnerabilities and limitations. Information stored in mobile phones, whether it is personal or corporate, is valuable to mobile phone users. Such information also seeks the attention of intruders. Moreover, an intruder can compromise the mobile phone, and use it as a medium to get into other mobile phones. Mobile phone users are unaware of this current dilemma. Therefore, the need to protect information, as well as mobile phone users to supervise their incoming connections, is very vital. An additional security mechanism was therefore realized, especially at the mobile phone's user level, and which could be useful to the mobile phone users. Bluetooth Logging Agent (BLA) is such a mechanism. It helps in alleviating the current security issues by making the users aware of their incoming Bluetooth connections and giving them an option to either accept or reject these connections. Besides this, the intrusion detection and verification module uses databases and rules to authenticate and verify all connections. The BLA when comparing to the existing security solutions is unique in that; it is equipped with a Bluetooth message logging module. This logging module reduces the security risks by monitoring the Bluetooth communication between the mobile phone and the remote device.
dc.publisher North-West University
dc.title Intrusion detection in bluetooth enabled mobile phones / Kishor K. Nair en
dc.type Thesis en
dc.description.thesistype Masters


Files in this item

This item appears in the following Collection(s)

  • ETD@PUK [5159]
    This collection contains the original digitized versions of research conducted at the North-West University (Potchefstroom Campus)

Show simple item record

Search the NWU Repository


Advanced Search

Browse

My Account

Statistics