Show simple item record

dc.contributor.authorNair, Kishor Krishnan
dc.date.accessioned2009-11-17T10:03:06Z
dc.date.available2009-11-17T10:03:06Z
dc.date.issued2008
dc.identifier.urihttp://hdl.handle.net/10394/2560
dc.descriptionThesis (M.Ing. (Computer and Electronical Engineering))--North-West University, Potchefstroom Campus, 2009.
dc.description.abstractWireless technology has become one of the vital media of communication and Bluetooth is playing a major role in advancing its global spread, connecting electronic devices worldwide without cables. Bluetooth is recognized and globally accepted mainly through Bluetooth enabled mobile phones, which cover almost 60% of the Bluetooth market. However, with other technological innovations, the advancement in Bluetooth enabled mobile phones also caused serious security breaches. Although Bluetooth mobile phones are equipped with built-in security modes and policies, the intruders compromise the mobile phones through existing security vulnerabilities and limitations. Information stored in mobile phones, whether it is personal or corporate, is valuable to mobile phone users. Such information also seeks the attention of intruders. Moreover, an intruder can compromise the mobile phone, and use it as a medium to get into other mobile phones. Mobile phone users are unaware of this current dilemma. Therefore, the need to protect information, as well as mobile phone users to supervise their incoming connections, is very vital. An additional security mechanism was therefore realized, especially at the mobile phone's user level, and which could be useful to the mobile phone users. Bluetooth Logging Agent (BLA) is such a mechanism. It helps in alleviating the current security issues by making the users aware of their incoming Bluetooth connections and giving them an option to either accept or reject these connections. Besides this, the intrusion detection and verification module uses databases and rules to authenticate and verify all connections. The BLA when comparing to the existing security solutions is unique in that; it is equipped with a Bluetooth message logging module. This logging module reduces the security risks by monitoring the Bluetooth communication between the mobile phone and the remote device.
dc.publisherNorth-West University
dc.titleIntrusion detection in bluetooth enabled mobile phonesen
dc.typeThesisen
dc.description.thesistypeMasters


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record