12,769 Hits in 2.9 sec

Improved Pairing Protocol for Bluetooth [chapter]

Dave Singelée, Bart Preneel
2006 Lecture Notes in Computer Science  
We propose a new initialization mechanism for the key agreement protocol of Bluetooth.  ...  This improved pairing protocol can be easily extended so that it will not only solve the dependency of the keys on the PIN, but also the location privacy problem and an important Denial of Service attack  ...  Our improved pairing protocol is efficient, user-friendly and it solves some critical security problems of Bluetooth.  ... 
doi:10.1007/11814764_21 fatcat:wqa77zsz4vcgtjmr57ujhrlx3i

Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure

Da-Zhi Sun, Yi Mu, Willy Susilo
2017 Personal and Ubiquitous Computing  
In the Bluetooth standard, Secure Simple Pairing (SSP) is an essential security mechanism for Bluetooth devices. We examine the security of SSP in the recent Bluetooth standard V5.0.  ...  In the Bluetooth standard, Secure Simple Pairing (SSP) is an essential security mechanism for Bluetooth devices. We examine the security of SSP in the recent Bluetooth standard V5.0.  ...  Moreover, the improved protocol only increases one round message exchange between the pairing Bluetooth devices and one hash computation for each of them, compared with the original protocol.  ... 
doi:10.1007/s00779-017-1081-6 fatcat:tdfvngdi65asnd36xcfrlpp4ka

Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing

Da-Zhi Sun, Ji-Dong Zhong, Ximeng Liu
2021 Security and Communication Networks  
As an open standard for the short-range radio frequency communications, Bluetooth is suitable for Mobile Crowdsensing Systems (MCS).  ...  Under our formal privacy model, the improved protocol provably solves the traceability problem of the original protocol in the Bluetooth standard.  ...  Improved Unilateral Bluetooth Authentication Protocol In this section, we improve the unilateral authentication protocol to prevent the proposed privacy weakness.  ... 
doi:10.1155/2021/5598574 fatcat:obvdddwtlfc5lpg7kail6pnda4

On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy

Da-Zhi Sun, Li Sun, Ying Yang
2019 Sensors  
According to the Bluetooth standard specifications, the low energy secure simple pairing (LESSP) protocol is the process by which the pairing devices negotiate the authenticated secret key.  ...  We further prove that our improvement on the LESSP protocol is private under the privacy model.  ...  Acknowledgments: The authors would like to thank the editor and the reviewers for their valuable suggestions and comments.  ... 
doi:10.3390/s19153259 fatcat:s22ugcbexzaublitq6wu2ylhke

Bluetooth Command and Control channel

Heloise Pieterse, Martin S. Olivier
2014 Computers & security  
Vulnerabilities associated with Bluetooth technology led to improved security measures surrounding Bluetooth connections.  ...  Bluetooth is popular technology for short-range communications and is incorporated in mobile devices such as smartphones, tablet computers and laptops.  ...  The Secure Simple Pairing (SSP) protocol is the most widely used pairing protocol since the inclusion of the protocol in the Bluetooth Core specification version 2.1.  ... 
doi:10.1016/j.cose.2014.05.007 fatcat:levksc73a5d6vazb2v6va4m3ue

Bluetooth 5.2 Technology and Application

Jian Wang, Hui Liang
2021 International Journal of Advanced Network, Monitoring, and Controls  
This paper mainly introduces the new features of Bluetooth 5.2 technology, including enhanced ATT protocol, LE Power Control and LE Isochronous Channels.  ...  With the development of the times, the traditional Bluetooth technology can no longer meet people's needs, and a new generation of low-power Bluetooth audio technology standards came into being.  ...  Figure 1 . 1 Bluetooth pairing process diagram Figure 2 . 2 Bluetooth Pairing Flow Chart III. BLUETOOTH 5.  ... 
doi:10.21307/ijanmc-2021-014 fatcat:j2daqv6skff67optz6knmy2zvy

Model development with saving smartphone battery due to the activity of digital bluetooth and wifi devices to increase the reliability of the digital wireless remote control system

Kodir Aslonov, Anvar Akhmedov, Ramziddin Pirimov, Maktuba Rakhmatova, N. Voropai, S. Senderov, A. Michalevich, H. Guliev
2020 E3S Web of Conferences  
The article analyzes the advantages of devices for receiving and transmitting information smartphone, Bluetooth and WiFi technologies.  ...  In addition, an algorithm for a digital wireless remote control system based on the Arduino UNO microcontroller with Bluetooth and WiFi technologies is presented.  ...  Status -true for pairing smartphones and wireless control units (sorted table).  ... 
doi:10.1051/e3sconf/202021601143 fatcat:sfrj64j6dfesjazynbtym3dqpm

A Strenous Macroanalysis on the Substratals of Securing Bluetooth Mobile Workforce Devices

B. Nagajayanthi, V. Vijayakumari, R. Radhakrishnan
2016 Indian Journal of Science and Technology  
Bluetooth 4.0 features reliable pairing and encryption whereas the earlier versions had less importance on security.  ...  Bluetooth is a pretty impressive technology that connects and controls all the devices over a distance by using an IoT enabled APP due to which is there is a high possibility of Bluetooth charging for  ...  Practically, the controller functions are performed by the integrated Bluetooth adapter. The Link Manager Protocol is responsible for handling authentication, encryption, power control and pairing.  ... 
doi:10.17485/ijst/2016/v9i48/89769 fatcat:625kwfb2dbei3iwvugbu56sa6u

A Novel Bluetooth Man-In-The-Middle Attack Based On SSP using OOB Association model [article]

K. Saravanan, L. Vijayanand, R. K. Negesh
2012 arXiv   pre-print
In this paper, we propose a novel Man-In-The-Middle (MITM) attack against Bluetooth enabled mobile phone that support Simple Secure Pairing(SSP).  ...  As an interconnection technology, Bluetooth has to address all traditional security problems, well known from the distributed networks.  ...  Bluetooth version 2.1+EDR adds a new specification for the pairing procedure, namely Secure Simple Pairing (SSP).  ... 
arXiv:1203.4649v1 fatcat:4uxcpvqoardmdkq4j2jauy3654

25 Years of Bluetooth Technology

Sherali Zeadally, Farhan Siddiqui, Zubair Baig
2019 Future Internet  
We also discuss related issues (including security) and Bluetooth as a driving technology for the Internet of Things (IoT).  ...  For many of us, Bluetooth is an essential technology that we use every day. We provide an insight into the history of Bluetooth and its significant design developments over the last 25 years.  ...  Acknowledgments: We thank the anonymous reviewers for their valuable comments which helped us improve the quality, content, and organization of this paper.  ... 
doi:10.3390/fi11090194 fatcat:xof43v6hjvck5ewabrg5j5wqga

BlueSnarf Revisited: OBEX FTP Service Directory Traversal [chapter]

Alberto Moreno, Eiji Okamoto
2011 Lecture Notes in Computer Science  
In spite of the improvements, we introduce a multi-platform vulnerability for mobile phones that allows a remote attacker to list arbitrary directories, and read and write arbitrary files via Bluetooth  ...  When the first attacks to early Bluetooth mobile phones came up, manufacturers were forced to raise awareness about Bluetooth and make improvements in the security of the implementation.  ...  We would like to thank Jean-Luc Beuchat for giving us much feedback on the paper.  ... 
doi:10.1007/978-3-642-23041-7_16 fatcat:qjlyl6chgfakrjlgcw7gnz7we4

Bluetooth Data Exchange Between Android Phones Without Pairing [article]

Yakov Shafranovich
2016 arXiv   pre-print
In this paper we describe a novel method of exchanging data between Bluetooth smartphones on the Android platform without requiring pairing between devices.  ...  We discuss our approach of encoding and decoding data inside the UUIDs used by the Bluetooth Service Discovery Protocol (SDP).  ...  In the classical Bluetooth protocol scheme, devices use the Bluetooth Service Discovery Protocol (SDP) to scan for nearby devices and discover what services they offer.  ... 
arXiv:1507.00650v2 fatcat:r7vvgkxhqzhozes7usmwqxrqju

Connecting & Addressing Security Concerns of Bluetooth Technology in Current Scenario

Rajnish Mehra
Security in Bluetooth communication has been an active area of research for last few years.  ...  As Bluetooth Technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user's personal information.  ...  Unit key: same key is use for authentication for all the connection. Combination key: is specific to one pair of Bluetooth device. II.  ... 
doi:10.18535/ijetst/v3i01.05 fatcat:gkcj3lkiavdclpt4o2jfr2sb24

Security Vulnerabilities in Bluetooth Technology as Used in IoT

Angela Lonzetta, Peter Cope, Joseph Campbell, Bassam Mohd, Thaier Hayajneh
2018 Journal of Sensor and Actuator Networks  
Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant technology for connecting IoT (Internet of Things).  ...  Bluetooth technology is a key component of wireless communications. It provides a low-energy and low-cost solution for short-range radio transmissions.  ...  Bluetooth Protocol Stack Bluetooth Protocol Stack Bluetooth Protocol Stack Figure 2 below illustrates the Bluetooth protocol stack for Bluetooth versions 1, 2, and 3.  ... 
doi:10.3390/jsan7030028 fatcat:buiyxwdsrjaa7gyyx4od3amxwy

Digital Blues: An Investigation into the Use of Bluetooth Protocols [article]

William Ledbetter and William Bradley Glisson and Todd McDonald and Todd Andel and George Grispos and Kim-Kwang Raymond Choo
2018 arXiv   pre-print
First, it provides insight into real-world Bluetooth protocols that are being utilized by the general public.  ...  Second, it provides foundational research that is necessary for future Bluetooth penetration testing research.  ...  This was the first major security update that SIG published for Bluetooth, providing a considerable improvement to the pairing process utilized in previous versions [34] .  ... 
arXiv:1808.02153v1 fatcat:rklvtxneorhkxhzfpr55dnb5qm
« Previous Showing results 1 — 15 out of 12,769 results