Abstract

Everyday lives are dependent on networked services. Endpoint data capture was a necessity and Bluetooth was developed as a viable option. It is a point to point short range wireless technology that provides high capacity data transfer. IEEE standards 802.15 commonly termed as Bluetooth support. Bluetooth has the facility of automatic detection and is extremely easy to use. First Bluetooth worm was reported in 2004 and since then specific malware designed to propagate through Bluetooth have been reported. Bluetooth worm can harm the target device besides eating away battery life and malfunction within the target system. This paper analyses Bluetooth worm propagation and its peculiarities as compared with internet worms. Dependent models that study effects of mobility, concentration of mobiles in a particular area on the propagation of Bluetooth worm have been discussed.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call