IDEAS home Printed from https://ideas.repec.org/a/igg/jitn00/v4y2012i3p1-22.html
   My bibliography  Save this article

The Bluetooth Honeypot Project: Measuring and Managing Bluetooth Risks in the Workplace

Author

Listed:
  • Ashley Podhradsky

    (Dakota State University, USA)

  • Cindy Casey

    (Drexel University, USA)

  • Peter Ceretti

    (Drexel University, USA)

Abstract

Bluetooth technology (BT) and the inherent security vulnerabilities it introduces into business domains are often overlooked when security policies are developed. However, the International Data Corporation (IDC) projected that global Bluetooth short-wave wire semiconductor revenue will triple from $1.7 billion in 2007, to $3.3 billion in 2012 (Reidy, 2008). After a brief history of Bluetooth technology, researchers will examine how Bluetooth works, its vulnerabilities, and how these vulnerabilities can be exploited. Bluetooth malware and its associated risks will also be explored. As a practical approach to monitor Bluetooth threats and malware, the employment of a Bluetooth honeypot will be discussed, including honeypot structure and the legalities of deploying them. Building on Andrew Smith’s earlier work developing Bluepot, a functional Bluetooth honeypot (Smith, 2011), researchers will test Bluepot and discuss the feasibility of using it as a prototype for developing a functional Bluetooth honeypot to secure corporate data and analyze BT malware.

Suggested Citation

  • Ashley Podhradsky & Cindy Casey & Peter Ceretti, 2012. "The Bluetooth Honeypot Project: Measuring and Managing Bluetooth Risks in the Workplace," International Journal of Interdisciplinary Telecommunications and Networking (IJITN), IGI Global, vol. 4(3), pages 1-22, July.
  • Handle: RePEc:igg:jitn00:v:4:y:2012:i:3:p:1-22
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2012070101
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jitn00:v:4:y:2012:i:3:p:1-22. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.