Abstract
WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wireless network security 802.11, bluetooth and handheld devices (2002)
Bluetooth sig. (2006)
Armknecht, F.: An algebraic attack on bluetooth keystream generator (2004)
Cheng, P.-C., Garay, J.A., Herzberg, A., Krawczyk, H.: A security architecture for the internet protocol. IBM Syst. J. 37(1), 42–60 (1997)
Gehrmann, B.S., Persson, J.: Bluetooth seurity (2004)
John Jersin, J.W.: Security analysis of bluetooth v2.1 + edr pairing authentication protocol. CS259, Stanford University (March 2008)
Kennedy, T., Hunt, R.: A review of wpan security: attacks and prevention. In: Mobility 2008: Proceedings of the International Conference on Mobile Technology, Applications, and Systems, pp. 1–8. ACM, New York (2008)
Suri, R.S.: P.R. Bluetooth security - need to increase the efficiency in pairing, pp. 607–609 (April 2008)
Yu Xin, C.R., ZhaoShun, W.: Application of group key agreement based on authenticated dif?e-hellman for bluetooth piconet, vol. 2, pp. 125–128 (July 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Iqbal, M.M.W., Kausar, F., Wahla, M.A. (2010). Attacks on Bluetooth Security Architecture and Its Countermeasures. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-13365-7_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13364-0
Online ISBN: 978-3-642-13365-7
eBook Packages: Computer ScienceComputer Science (R0)