Bluetooth Worms: Models, Dynamics, and Defense Implications
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
shahid ahmed
Active In SP

Posts: 1
Joined: Jan 2010
13-01-2010, 07:36 PM

i m a electronics engineering student is very much interested in doing seminar and presentation on this project and implimentation so please provide me the matter.
i am waiting for your positive reply soon
Active In SP

Posts: 247
Joined: Jan 2010
14-01-2010, 08:59 PM

Recent occurrences of mobile phone worms like Cabir, Mabir and
CommWarrior have created growing concerns over the security of data
stored on mobile devices such as cell phones and PDAs. The fact that they use Bluetooth communication as their infection channel is a basic similarity between them. the nature, characteristics, and
spreading dynamics of Bluetooth worms are studied in simulation to aid protection. Some major findings sre:
1)The inherent
capacity constraints imposed by the wireless channel
,for example, interference and the Bluetooth protocol can
significantly slow down the Bluetooth worm propagation
2)Mobility may not boost the
Bluetooth worm propagation, but the link instability brought about by it has
negative impact on the worm spreading speed
3)Dexterously designed worms can improve their propagation speed by strategically selecting worm model parameters or exploiting out-of-band propagation capabilities.

the Bluetooth protocol design and im-
plementation is large and complex. a large-scale Blue-
tooth worm outbreak is viable today. Studies shows that start-
ing a Bluetooth worm infection is easy, once a vulnerability is dis-
covered. Bluetooth worms can infect a large population of vulnerable devices relatively
quickly, in just a few days.

Bluetooth is complex: its current Linux implementation consists
of over 25K lines of kernel code. Because Bluetoothâ„¢s codebase is
large, bugs are likely to be present in current implemen-
tations. As of now,no large-scale Bluetooth security attacks have been reported,but
a worm propagating over the Bluetooth protocol could cause mas-
sive disruptions with serious consequences. A malicious program
could launch a DoS attack and bring down a segment of the cellular
network. Cell-phone spyware could collect personal information. Cell-phone spyware could collect personal information.

The Bluetooth worms infect mobile, power-constrained devices
with Bluetooth radios. A Bluetooth infection occurs only when the
infection source and the victim are located near each other, as
Unlike Internet worms, Bluetooth wormsâ„¢ propagation is driven by
how the vulnerable devices interact, move, and travel.

If discoverable Bluetooth
devices are prevalent, a worm can ?nd and infect many devices,
once released. A heterogeneous population is more resistant to a worm exploiting a single
software vulnerability. Even if a worm outbreak occurs, short inter-device contacts could slow the
wormâ„¢s infection rate. The relative speed between
two people walking could be too high for a worm to replicate.

The following facts from studies give a good chance of propagation of bluetooth worms in present environment:
-Discoverable Bluetooth Devices are
Prevalent Today
-The Population of Devices
is Homogeneous
- Contact Durations are Long Enough for a
Worm to Replicate
-Worms can Replicate between Devices
Moving in Opposite Directions


In the simulation, parameters such as the number
of initial devices infected (i.e., the number of seeds), the total size
of the device population, the fraction of vulnerable devices, and the
time of the day when infections occur are monitored. To
simulate how a worm spreads worldwide, a trace needs to capture
the behavior of many devices at a global scale.

Bluetooth Worm Infection Dynamics
how quickly a worm infects vul-
nerable nodes in a population of 10,000 devices is examined.The worm starts spreading from the infected devices, i.e., seeds. We ?nd that a Bluetooth worm in-
fects half of the devices in four hours when the entire device pop-
ulation is vulnerable. When only 25% of devices are vulnerable,
half of them are infected in sixteen hours. that a worm slows-down during nighttime, but speeds up infections the following day.

For a seminar and presentation report on this topic , follow this link:

More details available in :

but you need to have an IEEE Xplore subscription for accessing it.
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  bluetooth based system administration project pdf Guest 1 62 31-10-2016, 10:44 AM
Last Post: ijasti
  gas dynamics and jet propulsion by senthil pdf free download Guest 1 86 29-10-2016, 12:32 PM
Last Post: jaseela123
  abstract for bluetooth based mobile phone photo browser Guest 1 77 11-10-2016, 03:47 PM
Last Post: amrutha735
  ppt on encrypted text chat using bluetooth Guest 1 57 11-10-2016, 11:13 AM
Last Post: amrutha735
  rococo bluetooth simulator free download Guest 1 66 08-10-2016, 11:03 AM
Last Post: amrutha735
  gas dynamics and jet propulsion by senthil pdf free download Guest 1 93 08-10-2016, 09:49 AM
Last Post: amrutha735
  project on online voting using bluetooth enabled mobile phones Guest 1 127 14-07-2016, 02:51 PM
Last Post: mkaasees
  gas dynamics and jet propulsion by senthil pdf free download Guest 1 127 09-07-2016, 11:38 AM
Last Post: Dhanabhagya
  gas dynamics and jet propulsion by senthil pdf free download Guest 1 73 02-07-2016, 11:01 AM
Last Post: jaseela123
  gas dynamics and jet propulsion by senthil pdf free download Guest 1 102 05-05-2016, 12:21 PM
Last Post: mkaasees