Open Access Open Access  Restricted Access Subscription Access

A Strenous Macroanalysis on the Substratals of Securing Bluetooth Mobile Workforce Devices


Affiliations
1 VIT University, Chennai - 632014, Tamil Nadu, India
2 Jawaharlal College of Engineering and Technology, Ottapalam - 679301, Kerala, India
3 Sasurie College of Engineering, Vijayamangalam - 638056, Tamil Nadu, India
 

Objectives: Bluetooth is extending to the blooming Internet of Things (IoT). This article provides an extensive literature survey on the security mechanisms; operational range of Bluetooth. Statistical Analysis: The user can achieve 3 Mbps data rate across an operational range of 100 meters. Bluetooth is a pretty impressive technology that connects and controls all the devices over a distance by using an IoT enabled APP due to which is there is a high possibility of Bluetooth charging for its services like the Internet Service Provider (ISP). Bluetooth 4.0 features reliable pairing and encryption whereas the earlier versions had less importance on security. Findings: In spite of the inherent security in Bluetooth, insidious security issues remain around Bluetooth transfer. Most of the problems were identified and rectified but still as the usage and technology improves, undiscovered problems bloom. There is no software in Bluetooth that has zero security vulnerabilities. Security threats can be overcome by generating a random key. This key is generated in random by combining the significant features of the device along with the customized features of the person. Improvements: Security can be upgraded by improving the strength of Authentication; Encryption algorithm; Augmenting Range of Bluetooth by making it IoT Enabled.

Keywords

Authentication, Encryption, Interoperable, Internet-of-Things, Range.
User

Abstract Views: 289

PDF Views: 0




  • A Strenous Macroanalysis on the Substratals of Securing Bluetooth Mobile Workforce Devices

Abstract Views: 289  |  PDF Views: 0

Authors

B. Nagajayanthi
VIT University, Chennai - 632014, Tamil Nadu, India
V. Vijayakumari
Jawaharlal College of Engineering and Technology, Ottapalam - 679301, Kerala, India
R. Radhakrishnan
Sasurie College of Engineering, Vijayamangalam - 638056, Tamil Nadu, India

Abstract


Objectives: Bluetooth is extending to the blooming Internet of Things (IoT). This article provides an extensive literature survey on the security mechanisms; operational range of Bluetooth. Statistical Analysis: The user can achieve 3 Mbps data rate across an operational range of 100 meters. Bluetooth is a pretty impressive technology that connects and controls all the devices over a distance by using an IoT enabled APP due to which is there is a high possibility of Bluetooth charging for its services like the Internet Service Provider (ISP). Bluetooth 4.0 features reliable pairing and encryption whereas the earlier versions had less importance on security. Findings: In spite of the inherent security in Bluetooth, insidious security issues remain around Bluetooth transfer. Most of the problems were identified and rectified but still as the usage and technology improves, undiscovered problems bloom. There is no software in Bluetooth that has zero security vulnerabilities. Security threats can be overcome by generating a random key. This key is generated in random by combining the significant features of the device along with the customized features of the person. Improvements: Security can be upgraded by improving the strength of Authentication; Encryption algorithm; Augmenting Range of Bluetooth by making it IoT Enabled.

Keywords


Authentication, Encryption, Interoperable, Internet-of-Things, Range.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i48%2F135554