A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Improved Pairing Protocol for Bluetooth
[chapter]
2006
Lecture Notes in Computer Science
We propose a new initialization mechanism for the key agreement protocol of Bluetooth. ...
This improved pairing protocol can be easily extended so that it will not only solve the dependency of the keys on the PIN, but also the location privacy problem and an important Denial of Service attack ...
Our improved pairing protocol is efficient, user-friendly and it solves some critical security problems of Bluetooth. ...
doi:10.1007/11814764_21
fatcat:wqa77zsz4vcgtjmr57ujhrlx3i
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
2017
Personal and Ubiquitous Computing
In the Bluetooth standard, Secure Simple Pairing (SSP) is an essential security mechanism for Bluetooth devices. We examine the security of SSP in the recent Bluetooth standard V5.0. ...
In the Bluetooth standard, Secure Simple Pairing (SSP) is an essential security mechanism for Bluetooth devices. We examine the security of SSP in the recent Bluetooth standard V5.0. ...
Moreover, the improved protocol only increases one round message exchange between the pairing Bluetooth devices and one hash computation for each of them, compared with the original protocol. ...
doi:10.1007/s00779-017-1081-6
fatcat:tdfvngdi65asnd36xcfrlpp4ka
Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing
2021
Security and Communication Networks
As an open standard for the short-range radio frequency communications, Bluetooth is suitable for Mobile Crowdsensing Systems (MCS). ...
Under our formal privacy model, the improved protocol provably solves the traceability problem of the original protocol in the Bluetooth standard. ...
Improved Unilateral Bluetooth Authentication Protocol In this section, we improve the unilateral authentication protocol to prevent the proposed privacy weakness. ...
doi:10.1155/2021/5598574
fatcat:obvdddwtlfc5lpg7kail6pnda4
On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy
2019
Sensors
According to the Bluetooth standard specifications, the low energy secure simple pairing (LESSP) protocol is the process by which the pairing devices negotiate the authenticated secret key. ...
We further prove that our improvement on the LESSP protocol is private under the privacy model. ...
Acknowledgments: The authors would like to thank the editor and the reviewers for their valuable suggestions and comments. ...
doi:10.3390/s19153259
fatcat:s22ugcbexzaublitq6wu2ylhke
Bluetooth Command and Control channel
2014
Computers & security
Vulnerabilities associated with Bluetooth technology led to improved security measures surrounding Bluetooth connections. ...
Bluetooth is popular technology for short-range communications and is incorporated in mobile devices such as smartphones, tablet computers and laptops. ...
The Secure Simple Pairing (SSP) protocol is the most widely used pairing protocol since the inclusion of the protocol in the Bluetooth Core specification version 2.1. ...
doi:10.1016/j.cose.2014.05.007
fatcat:levksc73a5d6vazb2v6va4m3ue
Bluetooth 5.2 Technology and Application
2021
International Journal of Advanced Network, Monitoring, and Controls
This paper mainly introduces the new features of Bluetooth 5.2 technology, including enhanced ATT protocol, LE Power Control and LE Isochronous Channels. ...
With the development of the times, the traditional Bluetooth technology can no longer meet people's needs, and a new generation of low-power Bluetooth audio technology standards came into being. ...
Figure 1 . 1 Bluetooth pairing process diagram
Figure 2 . 2 Bluetooth Pairing Flow Chart III. BLUETOOTH 5. ...
doi:10.21307/ijanmc-2021-014
fatcat:j2daqv6skff67optz6knmy2zvy
Model development with saving smartphone battery due to the activity of digital bluetooth and wifi devices to increase the reliability of the digital wireless remote control system
2020
E3S Web of Conferences
The article analyzes the advantages of devices for receiving and transmitting information smartphone, Bluetooth and WiFi technologies. ...
In addition, an algorithm for a digital wireless remote control system based on the Arduino UNO microcontroller with Bluetooth and WiFi technologies is presented. ...
Status -true for pairing smartphones and wireless control units
(sorted table). ...
doi:10.1051/e3sconf/202021601143
fatcat:sfrj64j6dfesjazynbtym3dqpm
A Strenous Macroanalysis on the Substratals of Securing Bluetooth Mobile Workforce Devices
2016
Indian Journal of Science and Technology
Bluetooth 4.0 features reliable pairing and encryption whereas the earlier versions had less importance on security. ...
Bluetooth is a pretty impressive technology that connects and controls all the devices over a distance by using an IoT enabled APP due to which is there is a high possibility of Bluetooth charging for ...
Practically, the controller functions are performed by the integrated Bluetooth adapter. The Link Manager Protocol is responsible for handling authentication, encryption, power control and pairing. ...
doi:10.17485/ijst/2016/v9i48/89769
fatcat:625kwfb2dbei3iwvugbu56sa6u
A Novel Bluetooth Man-In-The-Middle Attack Based On SSP using OOB Association model
[article]
2012
arXiv
pre-print
In this paper, we propose a novel Man-In-The-Middle (MITM) attack against Bluetooth enabled mobile phone that support Simple Secure Pairing(SSP). ...
As an interconnection technology, Bluetooth has to address all traditional security problems, well known from the distributed networks. ...
Bluetooth version 2.1+EDR adds a new specification for the pairing procedure, namely Secure Simple Pairing (SSP). ...
arXiv:1203.4649v1
fatcat:4uxcpvqoardmdkq4j2jauy3654
25 Years of Bluetooth Technology
2019
Future Internet
We also discuss related issues (including security) and Bluetooth as a driving technology for the Internet of Things (IoT). ...
For many of us, Bluetooth is an essential technology that we use every day. We provide an insight into the history of Bluetooth and its significant design developments over the last 25 years. ...
Acknowledgments: We thank the anonymous reviewers for their valuable comments which helped us improve the quality, content, and organization of this paper. ...
doi:10.3390/fi11090194
fatcat:xof43v6hjvck5ewabrg5j5wqga
BlueSnarf Revisited: OBEX FTP Service Directory Traversal
[chapter]
2011
Lecture Notes in Computer Science
In spite of the improvements, we introduce a multi-platform vulnerability for mobile phones that allows a remote attacker to list arbitrary directories, and read and write arbitrary files via Bluetooth ...
When the first attacks to early Bluetooth mobile phones came up, manufacturers were forced to raise awareness about Bluetooth and make improvements in the security of the implementation. ...
We would like to thank Jean-Luc Beuchat for giving us much feedback on the paper. ...
doi:10.1007/978-3-642-23041-7_16
fatcat:qjlyl6chgfakrjlgcw7gnz7we4
Bluetooth Data Exchange Between Android Phones Without Pairing
[article]
2016
arXiv
pre-print
In this paper we describe a novel method of exchanging data between Bluetooth smartphones on the Android platform without requiring pairing between devices. ...
We discuss our approach of encoding and decoding data inside the UUIDs used by the Bluetooth Service Discovery Protocol (SDP). ...
In the classical Bluetooth protocol scheme, devices use the Bluetooth Service Discovery Protocol (SDP) to scan for nearby devices and discover what services they offer. ...
arXiv:1507.00650v2
fatcat:r7vvgkxhqzhozes7usmwqxrqju
Connecting & Addressing Security Concerns of Bluetooth Technology in Current Scenario
2016
INTERNATIONAL JOURNAL OF EMERGING TRENDS IN SCIENCE AND TECHNOLOGY
Security in Bluetooth communication has been an active area of research for last few years. ...
As Bluetooth Technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user's personal information. ...
Unit key: same key is use for authentication for all the connection. Combination key: is specific to one pair of Bluetooth device.
II. ...
doi:10.18535/ijetst/v3i01.05
fatcat:gkcj3lkiavdclpt4o2jfr2sb24
Security Vulnerabilities in Bluetooth Technology as Used in IoT
2018
Journal of Sensor and Actuator Networks
Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant technology for connecting IoT (Internet of Things). ...
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low-cost solution for short-range radio transmissions. ...
Bluetooth Protocol Stack
Bluetooth Protocol Stack
Bluetooth Protocol Stack Figure 2 below illustrates the Bluetooth protocol stack for Bluetooth versions 1, 2, and 3. ...
doi:10.3390/jsan7030028
fatcat:buiyxwdsrjaa7gyyx4od3amxwy
Digital Blues: An Investigation into the Use of Bluetooth Protocols
[article]
2018
arXiv
pre-print
First, it provides insight into real-world Bluetooth protocols that are being utilized by the general public. ...
Second, it provides foundational research that is necessary for future Bluetooth penetration testing research. ...
This was the first major security update that SIG published for Bluetooth, providing a considerable improvement to the pairing process utilized in previous versions [34] . ...
arXiv:1808.02153v1
fatcat:rklvtxneorhkxhzfpr55dnb5qm
« Previous
Showing results 1 — 15 out of 12,769 results