The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: Bluetooth is extending to the blooming Internet of Things (IoT). This article provides an extensive literature survey on the security mechanisms; operational range of Bluetooth. Statistical Analysis: The user can achieve 3 Mbps data rate across an operational range of 100 meters. Bluetooth is a pretty impressive technology that connects and controls all the devices over a distance by using an IoT enabled APP due to which is there is a high possibility of Bluetooth charging for its services like the Internet Service Provider (ISP). Bluetooth 4.0 features reliable pairing and encryption whereas the earlier versions had less importance on security. Findings: In spite of the inherent security in Bluetooth, insidious security issues remain around Bluetooth transfer. Most of the problems were identified and rectified but still as the usage and technology improves, undiscovered problems bloom. There is no software in Bluetooth that has zero security vulnerabilities. Security threats can be overcome by generating a random key. This key is generated in random by combining the significant features of the device along with the customized features of the person. Improvements: Security can be upgraded by improving the strength of Authentication; Encryption algorithm; Augmenting Range of Bluetooth by making it IoT Enabled.

Keywords

Authentication, Encryption, Interoperable, Internet-of-Things, Range.
User