메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Analysis of Bluetooth threats and v4.0 security features

Author keywords

Association Models; Bluetooth Low Energy; Man in the Middle; Secure Simple Pairing

Indexed keywords

ASSOCIATION MODELS; BLUETOOTH PRODUCTS; BLUETOOTH TECHNOLOGY; GAIN INFORMATION; LOW ENERGIES; MAN IN THE MIDDLE; NORMAL MODES; OPERATIONAL MODES; SECURE SIMPLE PAIRING; SECURITY ASSOCIATION; SECURITY FEATURES; SECURITY ISSUES; WIRELESS COMMUNICATIONS;

EID: 84860641067     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCCA.2012.6179149     Document Type: Conference Paper
Times cited : (30)

References (20)
  • 8
    • 74549219772 scopus 로고    scopus 로고
    • Two practical man in the middle attacks on bluetooth secure simple pairing and countermeasures
    • Haataja, K., & Toivanen, P. (2010). Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures. IEEE Transactions on Wireless Communications, 9(1), 384-392.
    • (2010) IEEE Transactions on Wireless Communications , vol.9 , Issue.1 , pp. 384-392
    • Haataja, K.1    Toivanen, P.2
  • 11
    • 84955559079 scopus 로고    scopus 로고
    • Authenticated Multi-Party Key Agreement
    • Advances in Cryptology - ASIACRYPT '96
    • Just, M., & Vaudenay, S. (1996). Authenticated multi-party key agreement. In Advances in Cryptology- Asiacrypt '96, LNCS 1163 (pp. 36-49). (Pubitemid 126146211)
    • (1996) Lecture Notes in Computer Science , Issue.1163 , pp. 36-49
    • Just, M.1    Vaudenay, S.2
  • 13
    • 84860647357 scopus 로고    scopus 로고
    • Bluetooth v2.1-A new security infrastructure and new vulnerabilities
    • Las Vegas
    • Lindell, A. (2008). Bluetooth v2.1-A new security infrastructure and new vulnerabilities. BlackHat Briefings, Las Vegas.
    • (2008) BlackHat Briefings
    • Lindell, A.1
  • 16
    • 0032069870 scopus 로고    scopus 로고
    • Key control in key agreement protocols
    • Mitchell, C. J., Ward, M., & Wilson, P. (1998). Key control in key agreement protocols. IEE Electronics Letters, 34(10), 980-981 (Pubitemid 128560953)
    • (1998) Electronics Letters , vol.34 , Issue.10 , pp. 980-981
    • Mitchell, C.J.1    Ward, M.2    Wilson, P.3
  • 17
    • 78149281956 scopus 로고    scopus 로고
    • Authentication and ID-based key management protocol in pervasive environment
    • Moon, J. S., Park, J. H., Lee, D. G., & Lee, I.-Y. (2010). Authentication and ID-based key management protocol in pervasive environment. Wireless Personal Communications, 55(1), 91-103.
    • (2010) Wireless Personal Communications , vol.55 , Issue.1 , pp. 91-103
    • Moon, J.S.1    Park, J.H.2    Lee, D.G.3    Lee, I.-Y.4
  • 18
    • 59349096719 scopus 로고    scopus 로고
    • One-pass EAP-AKA authentication in 3G-WLAN integrated networks
    • Ntantogian, C., & Xenakis, C. (2009). One-pass EAP-AKA authentication in 3G-WLAN integrated networks. Wireless Personal Communications, 48(4), 569-584.
    • (2009) Wireless Personal Communications , vol.48 , Issue.4 , pp. 569-584
    • Ntantogian, C.1    Xenakis, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.