Change search
ReferencesLink to record
Permanent link

Direct link
Secure Bluetooth for Trusted m-Commerce
KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
Joint Research Centre of the European Commission.
2013 (English)In: International Journal of Communications, Network and System Sciences (IJCNS), ISSN 1913-3723, Vol. 6, no 6, 277-288 p.Article in journal (Refereed) Published
Abstract [en]

Our today’s world is becoming digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles, etc. One of the most widespread wireless capabilities is the Bluetooth protocol. Just in 2010, 906 million mobile Bluetooth enabled phones had been sold, and in 2011, there were more than 40 million Bluetooth enabled health and medical devices on the market. Still in 2011, one third of all new vehicles produced worldwide included Bluetooth technology. Security and privacy protection is key in the digital world of today. There are security and privacy risks such as device tracking, communication eavesdropping, etc., which may come from improper Bluetooth implementation with very severe conse- quences for the users. The objective of this paper is to analyze the usage of Bluetooth in m-commerce and m-payment fields. The steps undertaken in this paper in order to come to a proposal for a secure architecture are the analysis of the state of the art of the relevant specifications, the existing risks and the known vulnerabilities the related known attacks. Therefore, we give first an overview of the general characteristics of Bluetooth technology today, going deeper in the analysis of Bluetooth stack’s layers and the security features offered by the specifications. After this analysis of the specifications, we study how known vulnerabilities have been exploited with a comprehensive list of known attacks, which poses serious threats for the users. With all these elements as background, we conclude the paper proposing a design for Secure Architecture for Bluetooth-Enhanced Mobile “Smart” Commerce Environments.

Place, publisher, year, edition, pages
Scientific Research Publishing, 2013. Vol. 6, no 6, 277-288 p.
Keyword [en]
Bluetooth, Mobile Security, Mobile Commerce, Privacy
National Category
Communication Systems Computer Systems
Research subject
URN: urn:nbn:se:kth:diva-136820DOI: 10.4236/ijcns.2013.66030OAI: diva2:677325

Qc 20140205

Available from: 2013-12-09 Created: 2013-12-09 Last updated: 2014-02-05Bibliographically approved

Open Access in DiVA

fulltext(413 kB)104 downloads
File information
File name FULLTEXT01.pdfFile size 413 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Other links

Publisher's full textPublisher's website

Search in DiVA

By author/editor
Stirparo, Pasquale
By organisation
Communication Systems, CoS
Communication SystemsComputer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 104 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Altmetric score

Total: 76 hits
ReferencesLink to record
Permanent link

Direct link