Show simple item record

dc.contributor.authorWanjala, Chrispus Kimingichi
dc.contributor.authorMbuguah, Samuel Mungai
dc.contributor.authorKilwake, Juma
dc.date.accessioned2019-03-20T15:11:42Z
dc.date.available2019-03-20T15:11:42Z
dc.date.issued2015
dc.identifier.issn2079-8407
dc.identifier.urihttp://erepository.kibu.ac.ke/handle/123456789/282
dc.description.abstractAs the widespread use and acceptance of Bluetooth technology increases, concerns are being raised related to security vulnerabilities of this technology. Inadequate device resources and lack of user awareness has compounded this issue where the emphasis on design constraints, functionality and ease of use sometimes outweigh security concerns. The research determines vulnerability of Bluetooth security and the security risks these vulnerabilities poses to the users’ information stored in Bluetooth-enabled phones. The research design was based on multi-case study where two cases were selected. Questionnaires and interview were used in data collection. Both qualitative and quantitative approaches were used in data analysis. Descriptive statistical method was used for data analysis. The key findings from the study were that to improve security of information stored in Bluetooth-enabled phones, application layer security should be employed to provide additional security measures not provided in the current authentication and authorization process. Secondly the E0 encryption algorithm currently used for encryption is too weak and therefore the DES and AES algorithm should be used due to their efficiency and reliability. Lastly it was found out that most users have no knowledge on how to configure these devices thus manufactures of these devices should provide users with user documentation that explains the use and device configurations.en_US
dc.language.isoenen_US
dc.publisherJournal of Emerging Trends in Computing and Information Sciencesen_US
dc.rightsAttribution-NonCommercial-ShareAlike 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/us/*
dc.subjectBluetooth securityen_US
dc.subjectbluetooth technologyen_US
dc.subjectbluetooth-enabled phonesen_US
dc.titleInformation security risks posed by the bluetooth security weaknesses to the bluetooth-enabled phonesen_US
dc.typeArticleen_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-ShareAlike 3.0 United States
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-ShareAlike 3.0 United States