You are on page 1of 2

TABLE OF CONTENTS

CHAPTER NO. TITLE PAGE NO.

ABSTRACT iii
LIST OF TABLES xii
LIST OF FIGURES xiii
LIST OF SYMBOLS AND ABBREVIATIONS xvii

1 INTRODUCTION 1
GENERAL 1
BLUETOOTH TECHNOLOGY 2
BLUETOOTH ARCHITECTURE 4
Piconet and Scatternet 7
BLUETOOTH SECURITY
ARCHITECTURE 9
Authentication 10
Authorization 12
Encryption 13
APPLICATIONS OF BLUETOOTH 14
MOTIVATION FOR THE RESEARCH 15
OBJECTIVES 17
ORGANIZATION OF THESIS 18

2 LITERATURE REVIEW 20
INTRODUCTION 20
BLUETOOTH TECHNOLOGY 20
CHAPTER NO. TITLE PAGE NO.

Bluetooth Security 22
VULNERABILITIES 23
Man in the Middle Attack (MITM) 24
Eavesdropping Attack 25
Bluejacking Attack 26
Bluesnarfing Attack 27
APPLICATIONS 28
CONCLUSION 29

You might also like