An analysis of Bluetooth security vulnerabilities

被引:0
作者
Hager, CT [1 ]
Midkiff, SF [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
来源
WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3 | 2003年
关键词
Bluetooth; security; wireless personal area networks; vulnerability analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bluetooth has been developed to provide mobile ad hoc connectivity between a wide range of portable and fixed devices. In this paper, the Bluetooth system is described with an emphasis on its security features and known vulnerabilities. Additional security vulnerabilities were discovered using a scheme called VERDICT. These vulnerabilities are compared to vulnerabilities found in the IEEE 802.11 wireless local area network standard with VERDICT. Vulnerabilities were found as a result of improper validation, exposure, and randomness. These vulnerabilities include device address validation, invalid states, and exposed keys.
引用
收藏
页码:1825 / 1831
页数:7
相关论文
共 7 条
[1]  
*BLUET SPEC INT GR, 2001, BLUET SPEC V 1 1
[2]  
GIFFORD DK, 1998, MITLCSTM371
[3]  
Jakobsson M., 2001, CRYPTOGRAPHERS TRACK
[4]  
LOUGH DL, 2001, THESIS STAT U BLACKS
[5]  
RICE J, 2000, COLLABORATIVE PRODUC
[6]  
Schneier Bruce, 1996, APPL CRYPTOGRAPHY
[7]  
Vainio J. T., 2000, P HELS U TECHN TEL S