-
1
-
-
74549128638
-
-
[Online]. Available: [ Accessed Sep. 17 2009]
-
Bluetooth SIG, Bluetooth Specifications 1.0-3.0+HS. [Online]. Available: http://www.bluetooth.com/Bluetooth/Technology/Building/ Specifications. [Accessed Sep. 17, 2009].
-
Bluetooth SIG Bluetooth Specifications 1.0-3.0+HS
-
-
-
2
-
-
74549214828
-
-
[Online]. Available: [ Accessed Sep. 17, 2009]
-
Bluetooth SIG, Bluetooth Wireless Technology Surpasses One Billion Devices. [Online]. Available: http://www.bluetooth.com/ Bluetooth/Press/SIG/ BLUETOOTH WIRELESS TECHNOLOGY SURPASSES ONE BILLION DEVICES.htm. [Accessed Sep. 17, 2009].
-
Bluetooth SIG Bluetooth Wireless Technology Surpasses One Billion Devices
-
-
-
3
-
-
74549214468
-
-
[Online]. Available: [Accessed Sep. 17, 2009]
-
Bluetooth SIG, 2008 Marks Ten Years of Bluetooth Wireless Technology. [Online]. Available: http://www.bluetooth.com/Bluetooth/ Press/SIG/2008 MARKS TEN YEARS OF emBLUETOOTHem WIRELESS TECHNOLOGY.htm. [Accessed Sep. 17, 2009].
-
2008 Marks Ten Years of Bluetooth Wireless Technology
-
-
-
4
-
-
48749131952
-
-
[Online]. Available: [Accessed Sep. 17, 2009]
-
H. Cheung, "How to: building a BlueSniper Rifle-part 1." [Online]. Available: http://www.smallnetbuilder.com/content/view/24256/98. [Accessed Sep. 17, 2009].
-
How To: Building A BlueSniper Rifle-part 1
-
-
Cheung, H.1
-
5
-
-
48749131952
-
-
[Online]. Available: [Accessed Sep. 17, 2009]
-
H. Cheung, "How to: building a BlueSniper Rifle-part 2." [Online]. Available: http://www.smallnetbuilder.com/content/view/24228/98. [Accessed Sep. 17, 2009].
-
How To: Building A BlueSniper Rifle-part 2
-
-
Cheung, H.1
-
6
-
-
50049087174
-
-
[Online]. Available: [Accessed Sep. 17, 2009]
-
M. Moser, "Busting the Bluetooth myth-getting RAW access." [Online]. Available: http://www.packetstormsecurity.org/papers/wireless/busting bluetooth myth.pdf. [Accessed Sep. 17, 2009].
-
Busting the Bluetooth Myth-getting RAW Access
-
-
Moser, M.1
-
7
-
-
74549171599
-
-
Ph.D. dissertation, University of Kuopio, Department of Computer Science, Feb.
-
K. Haataja, "Security threats and countermeasures in Bluetooth-enabled systems," Ph.D. dissertation, University of Kuopio, Department of Computer Science, Feb. 6, 2009.
-
(2009)
Security Threats and Countermeasures in Bluetooth-enabled Systems
, vol.6
-
-
Haataja, K.1
-
8
-
-
74549202201
-
-
Darkircop[Online]. Available: [Accessed Sep. 17, 2009]
-
Darkircop, "CSR Sniffer-firmware assembler and disassembler." [Online]. Available: http://bluetooth-pentest.narod.ru/software/xap2.zip. [Accessed Sep. 17, 2009].
-
CSR Sniffer-firmware Assembler and Disassembler
-
-
-
10
-
-
74549178603
-
-
[Online]. Available: [ Accessed Sep. 17, 2009]
-
D. Spill and A. Bittau, BlueSniff source codes. [Online]. Available: http://www.cs.ucl.ac.uk/staff/a.bittau/gr-bluetooth.tar.gz. [Accessed Sep. 17, 2009].
-
BlueSniff Source Codes
-
-
Spill, D.1
Bittau, A.2
-
11
-
-
84935078039
-
Security weaknesses in Bluetooth
-
Springer- Verlag
-
M. Jakobsson and S. Wetzel, "Security weaknesses in Bluetooth," Lecture Notes in Computer Science, vol.2020, pp. 176-191, Springer- Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2020
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
12
-
-
31344471100
-
Man in the middle attacks on Bluetooth
-
Springer-Verlag
-
D. K̈ugler, "Man in the middle attacks on Bluetooth," Lecture Notes in Computer Science, vol.2742, pp. 149-161, Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2742
, pp. 149-161
-
-
K̈ugler, D.1
-
13
-
-
35048863385
-
Relay attacks on Bluetooth authentication and solutions
-
Springer-Verlag
-
A. Levi, E. Cetintas, M. Aydos, C. Koc, and M. Caglayan, "Relay attacks on Bluetooth authentication and solutions," Lecture Notes in Computer Science, vol.3280, pp. 278-288, Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3280
, pp. 278-288
-
-
Levi, A.1
Cetintas, E.2
Aydos, M.3
Koc, C.4
Caglayan, M.5
-
14
-
-
38149072454
-
Security associations in personal networks: A comparative analysis
-
Springer-Verlag
-
J. Suomalainen, J. Valkonen, and N. Asokan, "Security associations in personal networks: a comparative analysis," Lecture Notes in Computer Science, vol.4572, pp. 43-57, Springer-Verlag, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4572
, pp. 43-57
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
15
-
-
48749083665
-
Man-in-the-middle attack on Bluetooth secure simple pairing
-
Tashkent, Uzbekistan, Sep.
-
K. Hypp̈onen and K. Haataja, " Man-in-the-middle attack on Bluetooth secure simple pairing," in Proc. IEEE Third International Conference in Central Asia on Internet, The Next Generation of Mobile, Wireless and Optical Communications Networks (ICI'2007), Tashkent, Uzbekistan, Sep. 2007.
-
(2007)
Proc. IEEE Third International Conference in Central Asia on Internet, the Next Generation of Mobile, Wireless and Optical Communications Networks (ICI'2007)
-
-
Hypp̈onen, K.1
Haataja, K.2
-
16
-
-
50649091323
-
Man-in-the-middle attacks on Bluetooth: A comparative analysis, a novel attack, and countermeasures
-
St. Julians, Malta, Mar.
-
K. Haataja and K. Hypp̈onen, "Man-in-the-middle attacks on Bluetooth: a comparative analysis, a novel attack, and countermeasures," in Proc. IEEE Third International Symposium on Communications, Control and Signal Processing (ISCCSP'2008), St. Julians, Malta, Mar. 2008.
-
(2008)
Proc. IEEE Third International Symposium on Communications, Control and Signal Processing (ISCCSP'2008)
-
-
Haataja, K.1
Hypp̈onen, K.2
-
17
-
-
58049113593
-
Practical man-in-the-middle attacks against Bluetooth secure simple pairing
-
Dalian, China, Oct.
-
K. Haataja and P. Toivanen, "Practical man-in-the-middle attacks against Bluetooth secure simple pairing," in Proc. 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM'2008), Dalian, China, Oct. 2008.
-
(2008)
Proc. 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM'2008)
-
-
Haataja, K.1
Toivanen, P.2
-
18
-
-
38549108892
-
Usability analysis of secure pairing methods
-
Springer-Verlag
-
E. Uzun, K. Karvonen, and N. Asokan, "Usability analysis of secure pairing methods," Lecture Notes in Computer Science, vol.4886, pp. 307-324, Springer-Verlag, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.4886
, pp. 307-324
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
19
-
-
50049124688
-
-
[Online]. Available: [Accessed Sep. 17 2009]
-
J. Shandle, "University research aims at more secure Wi-Fi." [Online]. Available: http://www.eetimes.com/news/latest/showArticle.jhtml? articleID=192501255. [Accessed Sep. 17, 2009].
-
University Research Aims at More Secure Wi-Fi
-
-
Shandle, J.1
-
20
-
-
33748995703
-
Detecting impersonation attacks in future wireless and mobile networks
-
Springer-Verlag
-
M. Barbeau, J. Hall, and E. Kranakis, "Detecting impersonation attacks in future wireless and mobile networks," Lecture Notes in Computer Science, vol.4074, pp. 80-95, Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4074
, pp. 80-95
-
-
Barbeau, M.1
Hall, J.2
Kranakis, E.3
-
21
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver fingerprinting
-
Canada, July
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Randwyk, and D. Sicker, "Passive data link layer 802.11 wireless device driver fingerprinting, " in Proc. 15th USENIX Security Symposium, Vancouver, B.C., Canada, July 2006.
-
(2006)
Proc. 15th USENIX Security Symposium, Vancouver, B.C
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Randwyk, J.5
Sicker, D.6
-
22
-
-
34249822230
-
Wireless security through RF fingerprinting
-
O. Ureten and N. Serinken, "Wireless security through RF fingerprinting," Canadian J. Electrical and Computer Engineering, vol.32, no.1, pp. 27-33, 2007.
-
(2007)
Canadian J. Electrical and Computer Engineering
, vol.32
, Issue.1
, pp. 27-33
-
-
Ureten, O.1
Serinken, N.2
-
23
-
-
0343349593
-
Bayesian detection of radio transmitter turn-on transients
-
Antalya, Turkey, June
-
O. Ureten and N. Serinken, "Bayesian detection of radio transmitter turn-on transients," in Proc. IEEE Non Linear Signal and Image Processing Conference, Antalya, Turkey, June 1999, pp. 830-834.
-
(1999)
Proc. IEEE Non Linear Signal and Image Processing Conference
, pp. 830-834
-
-
Ureten, O.1
Serinken, N.2
-
24
-
-
38049181728
-
Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting
-
Lima, Peru, Oct.
-
J. Hall, M. Barbeau, and E. Kranakis, "Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting," in Proc. IASTED International Conference on Communications and Computer Networks (CCN'2006), Lima, Peru, Oct. 2006.
-
(2006)
Proc. IASTED International Conference on Communications and Computer Networks (CCN'2006)
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
26
-
-
56749178829
-
New efficient intrusion detection and prevention system for Bluetooth networks
-
Innsbruck, Austria, Feb.
-
K. Haataja, "New efficient intrusion detection and prevention system for Bluetooth networks," in Proc. ACM International Conference on Mobile, Wireless MiddleWare, Operating Systems, and Applications (Mobilware'2008), Innsbruck, Austria, Feb. 2008.
-
(2008)
Proc. ACM International Conference on Mobile, Wireless MiddleWare, Operating Systems, and Applications (Mobilware'2008)
-
-
Haataja, K.1
-
27
-
-
56749154535
-
-
[Online]. Available: [ Accessed Sep. 17, 2009]
-
ZigBee Alliance, Technical specifications-ZigBee specifications. [Online]. Available: http://www.zigbee.org/Products/ TechnicalDocumentsDownload/ tabid/237/Default.aspx. [Accessed Sep. 17, 2009].
-
ZigBee Alliance Technical Specifications-ZigBee Specifications
-
-
|