Eavesdropping in Bluetooth networks
Pages : 79-85, DOI: https://doi.org/10.14741/ijcet/v.13.2.5
Download PDF
Abstract
Bluetooth eavesdropping refers to the unauthorized access and monitoring of Bluetooth communications. This can be done through the use of specialized software and hardware tools that can intercept and analyze Bluetooth traffic. Bluetooth eavesdropping can be used to gain access to sensitive information, such as personal data, login credentials, and financial information, and can also be used to launch attacks on Bluetooth-enabled devices. To prevent Bluetooth eavesdropping, it is important to use strong encryption and authentication methods, as well as to keep Bluetooth-enabled devices in non-discoverable mode when not in use. Additionally, it is important to be aware of the presence of unauthorized devices in the vicinity, and to avoid pairing with unknown devices. This research paper aims to figure out how easy it is to break into Bluetooth networks and listen in on conversations. So, the technical details of this vulnerability will be looked at, as well as how cybercriminals use this type of network intrusion, how it influences network security and the hazards that eavesdropping in Bluetooth networks provides to an organization’s networks or other sorts of enterprises.
Keywords: Bluetooth, Security, Eavesdropping, Vulnerability, wireless