메뉴 건너뛰기




Volumn 9, Issue 1, 2010, Pages 384-392

Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures

Author keywords

Bluetooth; Man in the middle attack; Out ofband channel; Secure simple pairing; Wireless security

Indexed keywords

COMPARATIVE ANALYSIS; INPUT/OUTPUT; MAN IN THE MIDDLE ATTACKS; SECURE SIMPLE PAIRING; WIRELESS SECURITY;

EID: 74549219772     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2010.01.090935     Document Type: Article
Times cited : (89)

References (27)
  • 1
    • 74549128638 scopus 로고    scopus 로고
    • [Online]. Available: [ Accessed Sep. 17 2009]
    • Bluetooth SIG, Bluetooth Specifications 1.0-3.0+HS. [Online]. Available: http://www.bluetooth.com/Bluetooth/Technology/Building/ Specifications. [Accessed Sep. 17, 2009].
    • Bluetooth SIG Bluetooth Specifications 1.0-3.0+HS
  • 2
    • 74549214828 scopus 로고    scopus 로고
    • [Online]. Available: [ Accessed Sep. 17, 2009]
    • Bluetooth SIG, Bluetooth Wireless Technology Surpasses One Billion Devices. [Online]. Available: http://www.bluetooth.com/ Bluetooth/Press/SIG/ BLUETOOTH WIRELESS TECHNOLOGY SURPASSES ONE BILLION DEVICES.htm. [Accessed Sep. 17, 2009].
    • Bluetooth SIG Bluetooth Wireless Technology Surpasses One Billion Devices
  • 3
    • 74549214468 scopus 로고    scopus 로고
    • [Online]. Available: [Accessed Sep. 17, 2009]
    • Bluetooth SIG, 2008 Marks Ten Years of Bluetooth Wireless Technology. [Online]. Available: http://www.bluetooth.com/Bluetooth/ Press/SIG/2008 MARKS TEN YEARS OF emBLUETOOTHem WIRELESS TECHNOLOGY.htm. [Accessed Sep. 17, 2009].
    • 2008 Marks Ten Years of Bluetooth Wireless Technology
  • 4
    • 48749131952 scopus 로고    scopus 로고
    • [Online]. Available: [Accessed Sep. 17, 2009]
    • H. Cheung, "How to: building a BlueSniper Rifle-part 1." [Online]. Available: http://www.smallnetbuilder.com/content/view/24256/98. [Accessed Sep. 17, 2009].
    • How To: Building A BlueSniper Rifle-part 1
    • Cheung, H.1
  • 5
    • 48749131952 scopus 로고    scopus 로고
    • [Online]. Available: [Accessed Sep. 17, 2009]
    • H. Cheung, "How to: building a BlueSniper Rifle-part 2." [Online]. Available: http://www.smallnetbuilder.com/content/view/24228/98. [Accessed Sep. 17, 2009].
    • How To: Building A BlueSniper Rifle-part 2
    • Cheung, H.1
  • 6
    • 50049087174 scopus 로고    scopus 로고
    • [Online]. Available: [Accessed Sep. 17, 2009]
    • M. Moser, "Busting the Bluetooth myth-getting RAW access." [Online]. Available: http://www.packetstormsecurity.org/papers/wireless/busting bluetooth myth.pdf. [Accessed Sep. 17, 2009].
    • Busting the Bluetooth Myth-getting RAW Access
    • Moser, M.1
  • 8
    • 74549202201 scopus 로고    scopus 로고
    • Darkircop[Online]. Available: [Accessed Sep. 17, 2009]
    • Darkircop, "CSR Sniffer-firmware assembler and disassembler." [Online]. Available: http://bluetooth-pentest.narod.ru/software/xap2.zip. [Accessed Sep. 17, 2009].
    • CSR Sniffer-firmware Assembler and Disassembler
  • 10
    • 74549178603 scopus 로고    scopus 로고
    • [Online]. Available: [ Accessed Sep. 17, 2009]
    • D. Spill and A. Bittau, BlueSniff source codes. [Online]. Available: http://www.cs.ucl.ac.uk/staff/a.bittau/gr-bluetooth.tar.gz. [Accessed Sep. 17, 2009].
    • BlueSniff Source Codes
    • Spill, D.1    Bittau, A.2
  • 11
    • 84935078039 scopus 로고    scopus 로고
    • Security weaknesses in Bluetooth
    • Springer- Verlag
    • M. Jakobsson and S. Wetzel, "Security weaknesses in Bluetooth," Lecture Notes in Computer Science, vol.2020, pp. 176-191, Springer- Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2020 , pp. 176-191
    • Jakobsson, M.1    Wetzel, S.2
  • 12
    • 31344471100 scopus 로고    scopus 로고
    • Man in the middle attacks on Bluetooth
    • Springer-Verlag
    • D. K̈ugler, "Man in the middle attacks on Bluetooth," Lecture Notes in Computer Science, vol.2742, pp. 149-161, Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2742 , pp. 149-161
    • K̈ugler, D.1
  • 14
    • 38149072454 scopus 로고    scopus 로고
    • Security associations in personal networks: A comparative analysis
    • Springer-Verlag
    • J. Suomalainen, J. Valkonen, and N. Asokan, "Security associations in personal networks: a comparative analysis," Lecture Notes in Computer Science, vol.4572, pp. 43-57, Springer-Verlag, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4572 , pp. 43-57
    • Suomalainen, J.1    Valkonen, J.2    Asokan, N.3
  • 18
    • 38549108892 scopus 로고    scopus 로고
    • Usability analysis of secure pairing methods
    • Springer-Verlag
    • E. Uzun, K. Karvonen, and N. Asokan, "Usability analysis of secure pairing methods," Lecture Notes in Computer Science, vol.4886, pp. 307-324, Springer-Verlag, 2008.
    • (2008) Lecture Notes in Computer Science , vol.4886 , pp. 307-324
    • Uzun, E.1    Karvonen, K.2    Asokan, N.3
  • 19
    • 50049124688 scopus 로고    scopus 로고
    • [Online]. Available: [Accessed Sep. 17 2009]
    • J. Shandle, "University research aims at more secure Wi-Fi." [Online]. Available: http://www.eetimes.com/news/latest/showArticle.jhtml? articleID=192501255. [Accessed Sep. 17, 2009].
    • University Research Aims at More Secure Wi-Fi
    • Shandle, J.1
  • 20
    • 33748995703 scopus 로고    scopus 로고
    • Detecting impersonation attacks in future wireless and mobile networks
    • Springer-Verlag
    • M. Barbeau, J. Hall, and E. Kranakis, "Detecting impersonation attacks in future wireless and mobile networks," Lecture Notes in Computer Science, vol.4074, pp. 80-95, Springer-Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4074 , pp. 80-95
    • Barbeau, M.1    Hall, J.2    Kranakis, E.3
  • 27
    • 56749154535 scopus 로고    scopus 로고
    • [Online]. Available: [ Accessed Sep. 17, 2009]
    • ZigBee Alliance, Technical specifications-ZigBee specifications. [Online]. Available: http://www.zigbee.org/Products/ TechnicalDocumentsDownload/ tabid/237/Default.aspx. [Accessed Sep. 17, 2009].
    • ZigBee Alliance Technical Specifications-ZigBee Specifications


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.