Date Published: June 2012
Withdrawn: May 08, 2017
Superseded By: SP 800-121 Rev. 2 (May 2017)
Supersedes: SP 800-121 (September 2008)
Author(s)
John Padgette (Accenture), Karen Scarfone (Scarfone Cybersecurity), Lily Chen (NIST)
Bluetooth is an open standard for short-range radio frequency communication. Bluetooth technology is used primarily to establish wireless personal area networks (WPANs), and it has been integrated into many types of business and consumer devices. This publication provides information on the security capabilities of Bluetooth technologies and gives recommendations to organizations employing Bluetooth technologies on securing them effectively. The Bluetooth versions within the scope of this publication are versions 1.1, 1.2, 2.0 + Enhanced Data Rate (EDR), 2.1 + EDR, 3.0 + High Speed (HS), and 4.0, which includes Low Energy (LE) technology.
Bluetooth is an open standard for short-range radio frequency communication. Bluetooth technology is used primarily to establish wireless personal area networks (WPANs), and it has been integrated into many types of business and consumer devices. This publication provides information on the...
See full abstract
Bluetooth is an open standard for short-range radio frequency communication. Bluetooth technology is used primarily to establish wireless personal area networks (WPANs), and it has been integrated into many types of business and consumer devices. This publication provides information on the security capabilities of Bluetooth technologies and gives recommendations to organizations employing Bluetooth technologies on securing them effectively. The Bluetooth versions within the scope of this publication are versions 1.1, 1.2, 2.0 + Enhanced Data Rate (EDR), 2.1 + EDR, 3.0 + High Speed (HS), and 4.0, which includes Low Energy (LE) technology.
Hide full abstract
Keywords
Bluetooth; Bluetooth security; wireless networking; wireless network security; wireless personal area networks
Control Families
Access Control;
System and Communications Protection;
System and Information Integrity;
System and Services Acquisition;