Nino Man-In-The-Middle attack on Bluetooth Secure Simple Pairing

被引:0
|
作者
Hypponen, Konstantin [1 ]
Haataja, Keijo M. J. [1 ]
机构
[1] Univ Kuopio, Dept Comp Sci, FIN-70211 Kuopio, Finland
关键词
authentication; authorization; Bluetooth; Man-In-The-Middle attack; Secure Simple Pairing; wireless security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As an interconnection technology, Bluetooth has to address all traditional security problems, well known from the distributed networks. Moreover, as Bluetooth networks are formed by the radio links, there are also additional security aspects whose impact is yet not well understood. In this paper, we describe a new Man-In-The-Middle (MITM) attack on Bluetooth Secure Simple Pairing. The attack is based on the falsification of information sent during the input/output capabilities exchange. In addition, we propose countermeasures that render the attack impractical, although not totally eliminating its potential danger.
引用
收藏
页码:64 / 68
页数:5
相关论文
共 50 条
  • [21] Bluetooth Secure Simple Pairing with enhanced security level
    Gajbhiye, Samta
    Karmakar, Sanjeev
    Sharma, Monisha
    Sharma, Sanjay
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 44 : 170 - 183
  • [22] On the Security of HB# against a Man-in-the-Middle Attack
    Ouafi, Khaled
    Overbeck, Raphael
    Vaudenay, Serge
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124
  • [23] Detection of Stealth Man-In-The-Middle Attack in Wireless LAN
    Kumar, Vikas
    Chakraborty, Sandip
    Barbhuiya, Ferdous A.
    Nandi, Sukumar
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 290 - 295
  • [24] Man-in-the-middle Pilot Attack for Physical Layer Authentication
    Wang Shaoyu
    Huang Kaizhi
    Xu Xiaoming
    Ma Keming
    Chen Yajun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (11) : 3141 - 3148
  • [25] Defending Against Man-In-The-Middle Attack in Repeated Games
    Li, Shuxin
    Li, Xiaohong
    Hao, Jianye
    An, Bo
    Feng, Zhiyong
    Chen, Kangjie
    Zhang, Chengwei
    PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 3742 - 3748
  • [26] Man-in-the-Middle Attack Mitigation in Internet of Medical Things
    Salem, Osman
    Alsubhi, Khalid
    Shaafi, Aymen
    Gheryani, Mostafa
    Mehaoua, Ahmed
    Boutaba, Raouf
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (03) : 2053 - 2062
  • [27] Mobile Authentication Secure Against Man-In-The-Middle Attacks
    Bicakci, Kemal
    Unal, Devrim
    Ascioglu, Nadir
    Adalier, Oktay
    9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 323 - 329
  • [28] A stealthy man-in-the-middle attack strategy for switched systems
    Sun, Dawei
    Hwang, Inseok
    Goppert, James
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2024, 55 (06) : 1206 - 1223
  • [29] Strengthening Megrelishvili Protocol Against Man-in-The-Middle Attack
    Arzaki, Muhammad
    2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 274 - 280
  • [30] RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack
    Zhai, Li
    Wu, ChuanKun
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 41 - 47