On Bluetooth security

نویسنده

  • Nikos Mavrogiannopoulos
چکیده

In this paper we discuss several aspects of the security of Bluetooth. Apart from security, several privacy issues linked to the use of Bluetooth protocols are also discussed. The focus is on the lower layer protocols, called the core Bluetooth protocols, thus security aspects of application profiles are left out of the scope of this document. We give a summary of the networking protocols of Bluetooth and try to describe in detail the security protocols. Are these protocol secure enough? Known attacks to the protocols and several privacy issues suggest not. The individual algorithms such as the stream algorithm and also the protocols they operate under seem to be vulnerable to multiple kind of attacks. As such the Bluetooth protocols alone should not be used to ensure authenticity or privacy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design, Implementation, and Evaluation of Bluetooth Security

Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. This article provides a study on the security issues behind the Bluetooth standard. After a overview of the general Bluetooth protocol, a security fr...

متن کامل

Enhancements to Bluetooth Baseband Security

Bluetooth system has been developed by Bluetooth Special Interest Group (Bluetooth SIG) as a cable replacement for short-range connectivity. In Bluetooth, special effort has been taken to develop and standardise adequate security mechanisms and procedures for protecting the wireless radio link. This set of mechanisms is defined in the Bluetooth Baseband specification [5] and is referred to as B...

متن کامل

Detailed descriptions of new proof-of-concept Bluetooth security analysis tools and new security attacks

This report describes the details of two new proof-of-concept Bluetooth security analysis tools and two new attacks against Bluetooth security. On-Line PIN Cracking script is a security analysis tool for on-line Bluetooth device PIN cracking. Brute-Force BD ADDR Scanning script is a security analysis tool for brute-force discovery of the addresses of Bluetooth devices that want to be private. S...

متن کامل

A Service-Level Security Protocol for Bluetooth Scatternets

Bluetooth is the term used to describe the protocol of short-range, and frequency hopping radio link between devices. Bluetooth enables users to connect wirelessly to a wide range of computing and communication devices easily and it provides opportunities for rapid ad hoc connections. In this type of networks, security is one of the main issues. Bluetooth link-level security provides authentica...

متن کامل

A Proposed Bluetooth Service-level Security

Bluetooth security has become increasingly important since Bluetooth is going to be used as a standard technology in wireless personal communication. This is especially true for Bluetooth applications that require strong security policies, e.g. mobile commerce applications. In this paper, a Bluetooth service-level security that allows easy implementation of flexible access policies is proposed....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005