[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Attacks on Bluetooth Security Architecture and Its Countermeasures

  • Conference paper
Information Security and Assurance (ISA 2010)

Abstract

WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wireless network security 802.11, bluetooth and handheld devices (2002)

    Google Scholar 

  2. Bluetooth sig. (2006)

    Google Scholar 

  3. Armknecht, F.: An algebraic attack on bluetooth keystream generator (2004)

    Google Scholar 

  4. Cheng, P.-C., Garay, J.A., Herzberg, A., Krawczyk, H.: A security architecture for the internet protocol. IBM Syst. J. 37(1), 42–60 (1997)

    Article  Google Scholar 

  5. Gehrmann, B.S., Persson, J.: Bluetooth seurity (2004)

    Google Scholar 

  6. John Jersin, J.W.: Security analysis of bluetooth v2.1 + edr pairing authentication protocol. CS259, Stanford University (March 2008)

    Google Scholar 

  7. Kennedy, T., Hunt, R.: A review of wpan security: attacks and prevention. In: Mobility 2008: Proceedings of the International Conference on Mobile Technology, Applications, and Systems, pp. 1–8. ACM, New York (2008)

    Chapter  Google Scholar 

  8. Suri, R.S.: P.R. Bluetooth security - need to increase the efficiency in pairing, pp. 607–609 (April 2008)

    Google Scholar 

  9. Yu Xin, C.R., ZhaoShun, W.: Application of group key agreement based on authenticated dif?e-hellman for bluetooth piconet, vol. 2, pp. 125–128 (July 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Iqbal, M.M.W., Kausar, F., Wahla, M.A. (2010). Attacks on Bluetooth Security Architecture and Its Countermeasures. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13365-7_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13364-0

  • Online ISBN: 978-3-642-13365-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics