Security Solutions India


Access Control & Security Systems Online Directory



Browse the subcategories
Wireless Security
Bluetooth Security
Protecting Bluetooth devices
Bluetooth FAQs


5 latest products

HP iPAQ rx3715 Mobile Media Companion




Parrot CK 3100


Bluetooth Audio Player OBH-0100


Nokia 6600

Featured Product

Apple wireless keyboard and Mouse


Sony Ericsson Headset HBH-660



Complete software solutions for  payroll software  for offices, guarding companies, outsourcing companies, exporters, schools... medical softwares like audio vestibular data management system, gynaecological software


You are here: Home >>Mobile Security Systems >> What is Denial of Services(DOS)

What is Denial of Service (DoS)? 

What is Denial of Service (DoS)?
The well known Denial of Service (DoS) Attack, which has been most popular for attacking internet web-sites and networks, is now an option for hackers of Bluetooth wireless technology enabled devices. This nuisance is neither original nor ingenious and is, very simply, a constant request for response from a hacker’s Bluetooth enabled computer (with specific software) to another Bluetooth enabled device such that it causes some temporary battery degradation in the receiving device. While occupying the Bluetooth link with invalid communication requests, the hacker can temporarily disable the product’s Bluetooth services.


Can a hacker get access to my devices data or content with DoS?
The DoS attack only offers the hacker the satisfaction of temporary annoyance, but does not allow for access to the device’s data or services – no information residing on the receiving device can be used or stolen by the attacker.


What devices are vulnerable to attacks, and what is the Bluetooth SIG doing about it?
DoS attacks can be performed on any discoverable Bluetooth device but in some cases, advanced hackers can determine the address of a non-discoverable Bluetooth device. The Bluetooth SIG takes all security issues seriously, and we constantly work to make the specification more secure. Therefore, future Bluetooth core specifications are planned to include features that will make it impossible to penetrate non-discoverable devices. There are also ways for manufacturers to reduce the risk of DoS attacks at the implementation level of Bluetooth wireless technology.


What is the risk of being on the receiving end of a DoS attack?
To date, DoS attacks on Bluetooth devices have only been conducted in laboratory tests. The risk of an attempted DoS attack should be considered minimal given the requirements and the normally short range of Bluetooth wireless technology.

Related Terms

Browse Categories

Computer And Information Security
CCTV, Surveillance Systems, Equipment & Components
Access Control Components, Equipment And Systems
Alarms, Burglar, Electronic Systems, Equipment & Components
Fire Protection, Detection & Controls
Intrusion Detection
Perimeter Security, Fences, Ballistic
Security & Specialty Services
Security Design Services
Facilities Systems

Find Products for :-


Find Solutions for:-
Complete information on security services, guarding services, investigators, detectives and security systems. We also have a online directory guide of the companies providing services the above services in different states of India like Delhi, Mumbai, Gurgaon, Banglore, Noida etc.


A Directory on Insurance as well as Insurance related topics updated to the latest. A total solutions site for your basic to advanced Insurance needs


Want a loan? Learn the pros and cons for taking a loan and lots of information for your finance problems.


Plan a trip to India! Visit the beautiful, culture rich country having diverse climates, castes, languages and creed. Each visit will add a new experience in your life, select your tour and make a trip to India with us



  © Copyright 2005. securitysolutionsindia. All Rights Reserved.