Bluelock a Tool to Prevent Bluetooth Attacks

α
Gerardo Alberto Castang Montiel.
Gerardo Alberto Castang Montiel.
σ
Fernando Betancourt Duque
Fernando Betancourt Duque
ρ
Luz  Adriana Peña Salazar
Luz Adriana Peña Salazar

Send Message

To: Author

Bluelock a Tool to Prevent Bluetooth Attacks

Article Fingerprint

ReserarchID

PRJJN

Bluelock a Tool to Prevent Bluetooth Attacks Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

The mobile device manufacturers and Internet Of Things are searching for more compatible and easy to connect protocols that increase coverage, which generates the user an effective experience when using different devices. Nevertheless, the constant updating process opens a security gap that exposes the users’ personal information. Bluetooth is a communication protocol openly used by manufacturers because of their excellent information transfer capacities, allowing hackers to exploit it. The manufacturers work daily, generating security patches for communication protocols but this hasn’t been enough to mitigate vulnerabilities. The security has always been on the manufacturer’s side but the final user is limited to use a few security customization options to protect his network perimeter. Based on the wireless devices’ background we wonder, Is there any way in which the user has the chance to reduce the possible dangers that wireless devices face? We can answer this question through the development of a research in the more vulnerable areas, simulating the attacks on a mobile device to generate a possible solution that allows the user to have more control over his bluetooth connections.

References

16 Cites in Article
  1. A Ramos,C Barbero,R Martínez,A García,J González (2015). Hacking y seguridad de páginas web.
  2. M Ciampa (2018). Understanding Security Fundamentals.
  3. Keijo Haataja,Konstantin Hyppönen,Sanna Pasanen,Pekka Toivanen (2013). Comparative Analysis of Bluetooth Security Attacks.
  4. A Conkin,G White,C Cothren,R Davis,D Williams (2018). Principles of Computer Security: CompTIA Security+ and Beyond.
  5. N Minar,M Tarique (2012). Bluetooth Security Threats and Solutions: A Survey.
  6. M Weed (2018). Bluetooth IoT Applications: From BLE to Mesh.
  7. C García (2010). Hablemos de Spoofing.
  8. Occupytheweb (2016). how to hack aol email password, how to hack someones facebook password? free and only 5 minutes.
  9. A Mitra (2017). What is Bluestack Attack?.
  10. (2019). USA: Developers Android.
  11. James Stevenson (2019). Application Names, Android Package Name, and ID.
  12. Alma Del Cid,R Méndez,F Sandoval (2011). Investigación. Fundamentos y metodología.
  13. Jorge Sutil (2019). “Este texto pone en riesgo la democracia”.
  14. Sindy Jiménez Toloza (2019). La autogestión de servicios en el sector de la telefonía celular.
  15. R Álvarez (2017). Se descubre una "grave vulnerabilidad" en Bluetooth que deja expuestos los dispositivos a posibles ataques. España.
  16. G Carro (2019). Esto es lo que puede pasar si tienes el bluetooth del móvil siempre conectado.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Gerardo Alberto Castang Montiel.. 2026. \u201cBluelock a Tool to Prevent Bluetooth Attacks\u201d. Global Journal of Research in Engineering - F: Electrical & Electronic GJRE-F Volume 22 (GJRE Volume 22 Issue F1): .

Download Citation

Bluejock to Prevent Bluetooth Attacks.
Journal Specifications

Crossref Journal DOI 10.17406/gjre

Print ISSN 0975-5861

e-ISSN 2249-4596

Keywords
Classification
GJRE-F Classification: FOR Code: 290903
Version of record

v1.2

Issue date

February 9, 2022

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 1707
Total Downloads: 38
2026 Trends
Related Research

Published Article

The mobile device manufacturers and Internet Of Things are searching for more compatible and easy to connect protocols that increase coverage, which generates the user an effective experience when using different devices. Nevertheless, the constant updating process opens a security gap that exposes the users’ personal information. Bluetooth is a communication protocol openly used by manufacturers because of their excellent information transfer capacities, allowing hackers to exploit it. The manufacturers work daily, generating security patches for communication protocols but this hasn’t been enough to mitigate vulnerabilities. The security has always been on the manufacturer’s side but the final user is limited to use a few security customization options to protect his network perimeter. Based on the wireless devices’ background we wonder, Is there any way in which the user has the chance to reduce the possible dangers that wireless devices face? We can answer this question through the development of a research in the more vulnerable areas, simulating the attacks on a mobile device to generate a possible solution that allows the user to have more control over his bluetooth connections.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Bluelock a Tool to Prevent Bluetooth Attacks

Gerardo Alberto Castang Montiel.
Gerardo Alberto Castang Montiel.
Fernando Betancourt Duque
Fernando Betancourt Duque
Luz  Adriana Peña Salazar
Luz Adriana Peña Salazar

Research Journals