Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Bluetooth Worms: Models, Dynamics, and Defense Implications
Post: #1

i m a electronics engineering student is very much interested in doing seminars on this project so please provide me the matter.
i am waiting for your positive reply soon
Post: #2
Recent occurrences of mobile phone worms like Cabir, Mabir and
CommWarrior have created growing concerns over the security of data
stored on mobile devices such as cell phones and PDAs. The fact that they use Bluetooth communication as their infection channel is a basic similarity between them. the nature, characteristics, and
spreading dynamics of Bluetooth worms are studied in simulation to aid protection. Some major findings sre:
1)The inherent
capacity constraints imposed by the wireless channel
,for example, interference and the Bluetooth protocol can
significantly slow down the Bluetooth worm propagation
2)Mobility may not boost the
Bluetooth worm propagation, but the link instability brought about by it has
negative impact on the worm spreading speed
3)Dexterously designed worms can improve their propagation speed by strategically selecting worm model parameters or exploiting out-of-band propagation capabilities.

the Bluetooth protocol design and im-
plementation is large and complex. a large-scale Blue-
tooth worm outbreak is viable today. Studies shows that start-
ing a Bluetooth worm infection is easy, once a vulnerability is dis-
covered. Bluetooth worms can infect a large population of vulnerable devices relatively
quickly, in just a few days.

Bluetooth is complex: its current Linux implementation consists
of over 25K lines of kernel code. Because Bluetoothâ„¢s codebase is
large, bugs are likely to be present in current implemen-
tations. As of now,no large-scale Bluetooth security attacks have been reported,but
a worm propagating over the Bluetooth protocol could cause mas-
sive disruptions with serious consequences. A malicious program
could launch a DoS attack and bring down a segment of the cellular
network. Cell-phone spyware could collect personal information. Cell-phone spyware could collect personal information.

The Bluetooth worms infect mobile, power-constrained devices
with Bluetooth radios. A Bluetooth infection occurs only when the
infection source and the victim are located near each other, as
Unlike Internet worms, Bluetooth wormsâ„¢ propagation is driven by
how the vulnerable devices interact, move, and travel.

If discoverable Bluetooth
devices are prevalent, a worm can ?nd and infect many devices,
once released. A heterogeneous population is more resistant to a worm exploiting a single
software vulnerability. Even if a worm outbreak occurs, short inter-device contacts could slow the
wormâ„¢s infection rate. The relative speed between
two people walking could be too high for a worm to replicate.

The following facts from studies give a good chance of propagation of bluetooth worms in present environment:
-Discoverable Bluetooth Devices are
Prevalent Today
-The Population of Devices
is Homogeneous
- Contact Durations are Long Enough for a
Worm to Replicate
-Worms can Replicate between Devices
Moving in Opposite Directions


In the simulation, parameters such as the number
of initial devices infected (i.e., the number of seeds), the total size
of the device population, the fraction of vulnerable devices, and the
time of the day when infections occur are monitored. To
simulate how a worm spreads worldwide, a trace needs to capture
the behavior of many devices at a global scale.

Bluetooth Worm Infection Dynamics
how quickly a worm infects vul-
nerable nodes in a population of 10,000 devices is examined.The worm starts spreading from the infected devices, i.e., seeds. We ?nd that a Bluetooth worm in-
fects half of the devices in four hours when the entire device pop-
ulation is vulnerable. When only 25% of devices are vulnerable,
half of them are infected in sixteen hours. that a worm slows-down during nighttime, but speeds up infections the following day.

For a seminars report on this topic , follow this link:

More details available in :

but you need to have an IEEE Xplore subscription for accessing it.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: models of technology, best defense survival, games worms bluetooth, report on slammer worms, dynamics ax, paper for virus worms and trojans ppt, physics models handmade,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  english grammar models exhibition Guest 2 273 22-07-2016 03:55 PM
Last Post: visalakshik
  images of simple working models for commerce Guest 1 206 04-07-2016 12:17 PM
Last Post: visalakshik
  science exhibition working models on disaster management Guest 1 531 18-06-2016 11:30 AM
Last Post: dhanyavp
  computational fluid dynamics anderson solution manual Guest 1 115 01-06-2016 03:26 PM
Last Post: dhanyavp
  comparison between bluetooth and wifi and gifi Guest 1 109 31-05-2016 12:31 PM
Last Post: dhanyavp
  buffer overflow attack a potential problem and its implications Guest 1 78 31-05-2016 11:34 AM
Last Post: dhanyavp
  bluetooth based home automation system pdf Ayunik 1 96 10-05-2016 11:21 AM
Last Post: dhanyavp
  loss models from data to decisions solution manual free pdf Guest 1 109 04-05-2016 10:49 AM
Last Post: dhanyavp
  computational fluid dynamics anderson solution manual Guest 1 111 25-04-2016 01:00 PM
Last Post: dhanyavp
  future scope of android bluetooth chat doc Guest 1 219 13-04-2016 02:11 PM
Last Post: dhanyavp