Nino Man-In-The-Middle attack on Bluetooth Secure Simple Pairing

被引:0
|
作者
Hypponen, Konstantin [1 ]
Haataja, Keijo M. J. [1 ]
机构
[1] Univ Kuopio, Dept Comp Sci, FIN-70211 Kuopio, Finland
关键词
authentication; authorization; Bluetooth; Man-In-The-Middle attack; Secure Simple Pairing; wireless security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As an interconnection technology, Bluetooth has to address all traditional security problems, well known from the distributed networks. Moreover, as Bluetooth networks are formed by the radio links, there are also additional security aspects whose impact is yet not well understood. In this paper, we describe a new Man-In-The-Middle (MITM) attack on Bluetooth Secure Simple Pairing. The attack is based on the falsification of information sent during the input/output capabilities exchange. In addition, we propose countermeasures that render the attack impractical, although not totally eliminating its potential danger.
引用
收藏
页码:64 / 68
页数:5
相关论文
共 50 条
  • [1] Man-in-the-Middle Attack and Its Countermeasure in Bluetooth Secure Simple Pairing
    Mutchukota, Thrinatha R.
    Panigrahy, Saroj Kumar
    Jena, Sanjay Kumar
    COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 367 - 376
  • [2] Practical Man-In-The-Middle Attacks Against Bluetooth Secure Simple Pairing
    Haataja, Keijo
    Toivanen, Pekka
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4821 - 4825
  • [3] Bluetooth Man-In-The-Middle Attack Based on Secure Simple Pairing using Out of Band Association Model
    Sharmila, D.
    Neelaveni, R.
    Kiruba, K.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1, 2009, : 353 - +
  • [4] Two Practical Man-In-The-Middle Attacks on Bluetooth Secure Simple Pairing and Countermeasures
    Haataja, Keijo
    Toivanen, Pekka
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (01) : 384 - 392
  • [5] Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
    Da-Zhi Sun
    Yi Mu
    Willy Susilo
    Personal and Ubiquitous Computing, 2018, 22 : 55 - 67
  • [6] Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
    Sun, Da-Zhi
    Mu, Yi
    Susilo, Willy
    PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (01) : 55 - 67
  • [7] Analyzing the technique of a man-in-the-middle attack based on Bluetooth
    Qin, Xiang-Lin
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (08): : 1159 - 1162
  • [8] Man-in-the-middle attack on quantum secure communications with authentication
    Lin, Tzu Han
    Hwang, Tzonelish
    QUANTUM INFORMATION PROCESSING, 2014, 13 (04) : 917 - 923
  • [9] Man-in-the-middle attack on quantum secure communications with authentication
    Tzu Han Lin
    Tzonelish Hwang
    Quantum Information Processing, 2014, 13 : 917 - 923
  • [10] Man-In-The-Middle attacks on Bluetooth:: A comparative analysis, a novel attack, and countermeasures
    Haataja, Keijo M. J.
    Hypponen, Konstantin
    2008 3RD INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS, CONTROL AND SIGNAL PROCESSING, VOLS 1-3, 2008, : 1096 - 1102