Bypassing Passkey Authentication in Bluetooth Low Energy

نویسنده

  • Tomás Rosa
چکیده

Since the attack runs on the Security Manager layer, it can reuse a lot of the existing network stack that is already in place for this approach. This namely concerns everything bellow HCI [1]. Actually, the whole procedure starting with the authentication bypass and continuing to data injection (which would be a regular communication anyway) can be done using a general Bluetooth 4.0 Smart Ready USB dongle via HCI commands.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing the Secure Simple Pairing in Bluetooth v4.0

This paper analyzes the security of Bluetooth v4.0’s Secure Simple Pairing (SSP) protocol, for both the Bluetooth Basic Rate / Enhanced Data Rate (BR/EDR) and Bluetooth Low Energy (LE) operational modes. Bluetooth v4.0 is the latest version of a wireless communication standard for low-speed and low-range data transfer among devices in a human’s PAN. It allows increased network mobility among de...

متن کامل

Personnel Security System using Bluetooth Low Energy (BLE) Tag

One of the primary aspects of Personal security is through various user authentication techniques like biometrics, password, Smart Card, etc. We propose to design a personal security authentication system using the commonly available Bluetooth technology. The authentication is done on a fixed device, connected to the web and the identity is provided by a mobile device commonly carried by the pe...

متن کامل

Attacks on the Pairing Protocol of Bluetooth v2.1

The Bluetooth protocol for close-range wireless communication has been a huge success. It is a widely adopted standard and is used for a wide range of devices, from cellphones to PDAs to laptops and more. Due to its ubiquity and importance, its security has become a critical issue. In the new version 2.1 released in July 2007, a complete overhaul of the pairing procedure was carried out with th...

متن کامل

Enhancements to Bluetooth Baseband Security

Bluetooth system has been developed by Bluetooth Special Interest Group (Bluetooth SIG) as a cable replacement for short-range connectivity. In Bluetooth, special effort has been taken to develop and standardise adequate security mechanisms and procedures for protecting the wireless radio link. This set of mechanisms is defined in the Bluetooth Baseband specification [5] and is referred to as B...

متن کامل

ISO MANA Certificates in Practice

The international standard ISO 9798-6 specifies MANA protocols for data authentication and an application of the MANA I protocol to public key authentication and key exchange. The resulting protocol is called the MANA certificate protocol an can be viewed as a passkey based key agreement protocol. In this paper we present an application of MANA certificate protocol to a wireless security associ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013