Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.9 Issue.2

Submission
Last date
30-Apr-2023
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-9,Issue-2. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  BLUETOOTH SECURITY ANALYSIS
PaperId: :  10307
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 5 Issue 3 2019
DUI:    16.0415/IJARIIE-10307
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
Priyanka Basavaraj MurdeshwarAlvas Institute of Engineering and Technology
Shruthi Tharanath SalianAlvas Institute of Engineering and Technology
Surekha ReddyAlvas Institute of Engineering and Technology
Sharath D SAlvas Institute of Engineering and Technology
Dr. Manjunath KotariAlvas Institute of Engineering and Technology

Abstract

COMPUTER ENGINEERING
Bluetooth, piconet, Ethernet, Deffie Hellman, Encryption.
Bluetooth is one of the advanced technology which replaced the complex technology of transferring information through wires and cables. Bluetooth is currently deployed in mobile phones, gaming consoles, laptops and wireless devices. Over a couple or more years many countries are using Bluetooth in field of defence. United States of America Department of Defence have begun to disclose the security failures of Bluetooth. There were no security features provided for Bluetooth before. Here we discuss how Bluetooth security works, and then move onto the security risks and requirements associated with designing and implementing Bluetooth based solutions for use in the Department of Defence. Further, open security problems that impact the future of Bluetooth use in the Department of Defence such as service-level security modes etc.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE Priyanka Basavaraj Murdeshwar, Shruthi Tharanath Salian, Surekha Reddy, Sharath D S, and Dr. Manjunath Kotari. "BLUETOOTH SECURITY ANALYSIS" International Journal Of Advance Research And Innovative Ideas In Education Volume 5 Issue 3 2019 Page 713-718
MLA Priyanka Basavaraj Murdeshwar, Shruthi Tharanath Salian, Surekha Reddy, Sharath D S, and Dr. Manjunath Kotari. "BLUETOOTH SECURITY ANALYSIS." International Journal Of Advance Research And Innovative Ideas In Education 5.3(2019) : 713-718.
APA Priyanka Basavaraj Murdeshwar, Shruthi Tharanath Salian, Surekha Reddy, Sharath D S, & Dr. Manjunath Kotari. (2019). BLUETOOTH SECURITY ANALYSIS. International Journal Of Advance Research And Innovative Ideas In Education, 5(3), 713-718.
Chicago Priyanka Basavaraj Murdeshwar, Shruthi Tharanath Salian, Surekha Reddy, Sharath D S, and Dr. Manjunath Kotari. "BLUETOOTH SECURITY ANALYSIS." International Journal Of Advance Research And Innovative Ideas In Education 5, no. 3 (2019) : 713-718.
Oxford Priyanka Basavaraj Murdeshwar, Shruthi Tharanath Salian, Surekha Reddy, Sharath D S, and Dr. Manjunath Kotari. 'BLUETOOTH SECURITY ANALYSIS', International Journal Of Advance Research And Innovative Ideas In Education, vol. 5, no. 3, 2019, p. 713-718. Available from IJARIIE, http://ijariie.com/AdminUploadPdf/BLUETOOTH_SECURITY_ANALYSIS_ijariie10307.pdf (Accessed : ).
Harvard Priyanka Basavaraj Murdeshwar, Shruthi Tharanath Salian, Surekha Reddy, Sharath D S, and Dr. Manjunath Kotari. (2019) 'BLUETOOTH SECURITY ANALYSIS', International Journal Of Advance Research And Innovative Ideas In Education, 5(3), pp. 713-718IJARIIE [Online]. Available at: http://ijariie.com/AdminUploadPdf/BLUETOOTH_SECURITY_ANALYSIS_ijariie10307.pdf (Accessed : )
IEEE Priyanka Basavaraj Murdeshwar, Shruthi Tharanath Salian, Surekha Reddy, Sharath D S, and Dr. Manjunath Kotari, "BLUETOOTH SECURITY ANALYSIS," International Journal Of Advance Research And Innovative Ideas In Education, vol. 5, no. 3, pp. 713-718, May-Jun 2019. [Online]. Available: http://ijariie.com/AdminUploadPdf/BLUETOOTH_SECURITY_ANALYSIS_ijariie10307.pdf [Accessed : ].
Turabian Priyanka Basavaraj Murdeshwar, Shruthi Tharanath Salian, Surekha Reddy, Sharath D S, and Dr. Manjunath Kotari. "BLUETOOTH SECURITY ANALYSIS." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 5 number 3 ().
Vancouver Priyanka Basavaraj Murdeshwar, Shruthi Tharanath Salian, Surekha Reddy, Sharath D S, and Dr. Manjunath Kotari. BLUETOOTH SECURITY ANALYSIS. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2019 [Cited : ]; 5(3) : 713-718. Available from: http://ijariie.com/AdminUploadPdf/BLUETOOTH_SECURITY_ANALYSIS_ijariie10307.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads



Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
A Review on Types of Real Time Image Processing MethodsComputer Science EngineringShruthi M K Download
Analysis of Image Steganographic techniquesComputer Science EngineeringMadhu R Download
Knowledge Representation and Reasoning: A Review of Current Techniques and Future Directions in AIComputer EngineeringRizwan Abdul Rahim Download
REAL TIME CHATTING APPLICATION FOR NATIVE ORGANIZATIONComputer EngineeringNIRANJAN V Download
AN INTRUSION DETECTION SYSTEM TO PREVENT THE K-ZERO DAY ATTACK PROPAGATIONCOMPUTER ENGINEERING BHARATH A Download
Street Dancers web applicationComputer science Veluguri Bhavitha kumari Download
Base Station Monitoring SystemComputer EngineeringDheenuka M Download
Remote workforce checkin systemComputer EngineeringDhaniesh M Download
DIGITAL CAMPUS QUERY ACQUISITION SYSTEMComputer Scence and EngineeringGOWTHAMA KURINJI VEANDAN R M Download
Hand Gesture Controlled Virtual Mouse Using Artificial Intelligence.Computer Science and EngineeringKAVITHA R Download
REAL TIME DETECTION AND CLASSIFICATION OF YOGA POSE USING TENSORFLOW MOVENETComputer EngineeringJayasurya J Download
CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM FOR REAL ESTATECOMPUTER ENGINEERINGHEMAPRIYA R Download
CROP DISEASE DETECTION USING CNNCOMPUTER SCIENCE AND ENGINEERINGE.Angel Anna Prathiba Download
Customer Segmentation using Tableau MethodComputer Science and EngineeringS.Sivaselvi Download
Bank loan prediction system using Logistic RegressionComputer Science and EngineeringS.Sivaselvi Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2023. IJARIIE. All Rights Reserved.