A REVIEW OF BLUETOOTH NETWORK

  • Asha K S

Abstract

By offering short-distance wireless connectivity between two or more users with less power consumption and low cost, the Bluetooth network is an important aspect of communication. In Bluetooth technology, the mainstream Bluetooth 2.4 GHz is used. Because of certain vulnerability problems in Bluetooth networks, a malicious group receives unauthorized access and carries out internal attacks. Without any detection, the data is collected. Virus corrupts the files and modifies them. The security attacks create issues in privacy of a customer. Personal data can be hacked. Network protection is incorporated in Bluetooth to solve this challenge. Good security architecture is important for network security to be effective. This paper focuses on various security attacks and how to deal with them on a Bluetooth network. To solve these serious problems, various solutions as well as safety tips are given. Because of the vulnerability problem on the Bluetooth network, users would be aware of the attacks. As sensitive information should be protected, consumer privacy will be maintained.

 

Published
2019-08-30
Section
Articles