DocumentCode :
3468195
Title :
An analysis of Bluetooth security vulnerabilities
Author :
Hager, Creighton T. ; Midkiff, Scott F.
Author_Institution :
Bradley Dept. of Electr. & Comput. Eng, Virginia Polytech. Inst., Blacksburg, VA, USA
Volume :
3
fYear :
2003
fDate :
20-20 March 2003
Firstpage :
1825
Abstract :
Bluetooth has been developed to provide mobile ad hoc connectivity between a wide range of portable and fixed devices. In this paper, the Bluetooth system is described with an emphasis on its security features and known vulnerabilities. Additional security vulnerabilities were discovered using a scheme called VERDICT. These vulnerabilities are compared to vulnerabilities found in the IEEE 802.11 wireless local area network standard with VERDICT. Vulnerabilities were found as a result of poor improper validation, exposure, and randomness. These vulnerabilities include device address validation, invalid states, and exposed keys.
Keywords :
Bluetooth; ad hoc networks; mobile communication; personal communication networks; telecommunication security; Bluetooth security vulnerability; IEEE 802.11 wireless local area network standard; VERDICT scheme; authentication vulnerability; device address validation; encryption vulnerability; exposed key; key generation; mobile ad hoc connectivity; network security; security weakness; validation exposure randomness deallocation improper conditions taxonomy; vulnerability analysis; wireless personal area network; Authentication; Bluetooth; Communication system security; Cryptography; National security; Protocols; Taxonomy; Wireless LAN; Wireless communication; Wireless personal area networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE
Conference_Location :
New Orleans, LA, USA
ISSN :
1525-3511
Print_ISBN :
0-7803-7700-1
Type :
conf
DOI :
10.1109/WCNC.2003.1200664
Filename :
1200664
Link To Document :
بازگشت