ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

BLUEBORNE VULNERABILITIES IN BLUETOOTH IMPLEMENTATIONS IN DIFFERENT OPERATION SYSTEMS

Journal: International Scientific Journal "Internauka" (Vol.1, No. 53)

Publication Date:

Authors : ;

Page : 36-38

Keywords : Bluetooth; BlueBorn; Information Security;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Ubiquitous adaptation of protocols and technologies for implementations of old solutions in new platform make it more unsecured. That leads to constant change and adaptation. Many solutions aren't revised and insufficiently tested, which is connected to spectrum of systems and devices. It isn't surprising that one of the main and most popular technology stacks - Bluetooth have serious vulnerabilities.

Last modified: 2018-08-08 01:48:06