A Strenous Macroanalysis on the Substratals of Securing Bluetooth Mobile Workforce Devices

B. Nagajayanthi, V. Vijayakumari, R. Radhakrishnan
2016 Indian Journal of Science and Technology  
Objectives: Bluetooth is extending to the blooming Internet of Things (IoT). This article provides an extensive literature survey on the security mechanisms; operational range of Bluetooth. Statistical Analysis: The user can achieve 3 Mbps data rate across an operational range of 100 meters. Bluetooth is a pretty impressive technology that connects and controls all the devices over a distance by using an IoT enabled APP due to which is there is a high possibility of Bluetooth charging for its
more » ... rvices like the Internet Service Provider (ISP). Bluetooth 4.0 features reliable pairing and encryption whereas the earlier versions had less importance on security. Findings: In spite of the inherent security in Bluetooth, insidious security issues remain around Bluetooth transfer. Most of the problems were identified and rectified but still as the usage and technology improves, undiscovered problems bloom. There is no software in Bluetooth that has zero security vulnerabilities. Security threats can be overcome by generating a random key. This key is generated in random by combining the significant features of the device along with the customized features of the person. Improvements: Security can be upgraded by improving the strength of Authentication; Encryption algorithm; Augmenting Range of Bluetooth by making it IoT Enabled.
doi:10.17485/ijst/2016/v9i48/89769 fatcat:625kwfb2dbei3iwvugbu56sa6u