메뉴 건너뛰기




Volumn , Issue , 2006, Pages 313-329

Bluetooth Security

Author keywords

Bluetooth link keys unit and combination keys; Bluetooth wireless technology and Bluetooth security concept; Security weaknesses and countermeasures

Indexed keywords


EID: 84889272424     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1002/9780470099742.ch18     Document Type: Chapter
Times cited : (1)

References (27)
  • 1
    • 84889348936 scopus 로고    scopus 로고
    • Bluetooth Special Interest Group (SIG), Specification of the Bluetooth System, Version 1.2, Nov
    • Bluetooth Special Interest Group (SIG), Specification of the Bluetooth System, Version 1.2, http://www.bluetooth.org/spec/, Nov. 2003.
    • (2003)
  • 2
    • 33745762423 scopus 로고    scopus 로고
    • Bluetooth Security
    • Artech House, Norwood, MA
    • C. Gehrmann, J. Persson, and B. Smeets, Bluetooth Security, Artech House, Norwood, MA, 2004.
    • (2004)
    • Gehrmann, C.1    Persson, J.2    Smeets, B.3
  • 3
    • 84889411764 scopus 로고    scopus 로고
    • Differential cryptanalysis of SAFER+
    • Technical Report, Cylink, Sunnyvale, CA
    • M. Kuregian, G. H. Khachatrian, and J. L. Massey, Differential cryptanalysis of SAFER+, Technical Report, Cylink, Sunnyvale, CA, 1999.
    • (1999)
    • Kuregian, M.1    Khachatrian, G.H.2    Massey, J.L.3
  • 4
    • 4544275870 scopus 로고    scopus 로고
    • Redfang, War Nibbling: Bluetooth insecurity
    • software tool and research report, Oct
    • O. Whitehouse, Redfang, War Nibbling: Bluetooth insecurity, software tool and research report, http://www.atstake.com/research/tools/info_gathering/, Oct. 2003.
    • (2003)
    • Whitehouse, O.1
  • 5
    • 84889310019 scopus 로고    scopus 로고
    • Bluesniff, Bluetsniff-The next wardriving frontier
    • software tool and presentation, May
    • B. Potter and B. Caswell, Bluesniff, Bluetsniff-The next wardriving frontier, software tool and presentation, http://bluesniff.shmoo.com/, May 2004.
    • (2004)
    • Potter, B.1    Caswell, B.2
  • 6
    • 84935078039 scopus 로고    scopus 로고
    • Security weaknesses in Bluetooth
    • Proceedings of the RSA Conference 2001, LNCS 2020, Springer, New York
    • M. Jakobsson and S. Wetzel, Security weaknesses in Bluetooth, in Proceedings of the RSA Conference 2001, LNCS 2020, Springer, New York, 2001, pp. 176-191.
    • (2001) , pp. 176-191
    • Jakobsson, M.1    Wetzel, S.2
  • 7
    • 0142099692 scopus 로고    scopus 로고
    • Wireless network security
    • 802.11, Bluetooth and handheld devices, Special Publication 800-48, National Institute of Standards and Technology, Washington, DC, Nov
    • T. Karygiannis and L. Owens, Wireless network security, 802.11, Bluetooth and handheld devices, Special Publication 800-48, National Institute of Standards and Technology, Washington, DC, Nov. 2002.
    • (2002)
    • Karygiannis, T.1    Owens, L.2
  • 8
    • 4244031545 scopus 로고    scopus 로고
    • Bluetooth security
    • Technical Report
    • J. Vaino, Bluetooth security, Technical Report, http://www.niksula.cs.hut.fi/jiitv/bluesec.html, 2000.
    • (2000)
    • Vaino, J.1
  • 9
    • 31344471100 scopus 로고    scopus 로고
    • Preventing tracking and man in the middle attacks on Bluetooth devices
    • Financial Cryptography, Seventh International Conference 03, LNCS 2742, Springer, New York
    • D. Kügler, Preventing tracking and man in the middle attacks on Bluetooth devices, in Financial Cryptography, Seventh International Conference 03, LNCS 2742, Springer, New York, 2003, pp. 149-161.
    • (2003) , pp. 149-161
    • Kügler, D.1
  • 10
    • 0003956839 scopus 로고    scopus 로고
    • The TLS protocol
    • Version 1.0, RFC 2246, Internet Engineering Task Force
    • T. Dierks and C. Allen, The TLS protocol, Version 1.0, RFC 2246, Internet Engineering Task Force, www.ietf.org, 1999.
    • (1999)
    • Dierks, T.1    Allen, C.2
  • 11
    • 0004115841 scopus 로고    scopus 로고
    • The Internet key exchange (IKE)
    • RFC 2409, Internet Engineering Task Force
    • D. Harkins and D. Carrel, The Internet key exchange (IKE), RFC 2409, Internet Engineering Task Force, www.ietf.org, 1998.
    • (1998)
    • Harkins, D.1    Carrel, D.2
  • 12
    • 84889339985 scopus 로고    scopus 로고
    • Higher layer key exchange techniques for Bluetooth security
    • paper presented at the Opengroup Conference, Amsterdam, Oct
    • J.-O. Larsson, Higher layer key exchange techniques for Bluetooth security, paper presented at the Opengroup Conference, Amsterdam, Oct. 2001.
    • (2001)
    • Larsson, J.-O.1
  • 13
    • 24644434353 scopus 로고    scopus 로고
    • Security in personal area networks
    • C. Michell, Ed., Security for Mobility, Institution of Electrical Engineers, London
    • C. Gehrmann and K. Nyberg, Security in personal area networks, in C. Michell, Ed., Security for Mobility, Institution of Electrical Engineers, London, 2004, pp. 191-230.
    • (2004) , pp. 191-230
    • Gehrmann, C.1    Nyberg, K.2
  • 15
    • 84889289399 scopus 로고    scopus 로고
    • Shaman, deliverable 13
    • Technical Report, IST Project SHAMAN
    • S. Sovio et al., Shaman, deliverable 13, Technical Report, IST Project SHAMAN, http://www.ist-shaman.org, 2002.
    • (2002)
    • Sovio, S.1
  • 16
    • 23944521144 scopus 로고    scopus 로고
    • Manual Authentication for wireless devices
    • Spring
    • C. Gehrmann, C. Mitchell, and K. Nyberg, Manual Authentication for wireless devices, CryptoBytes, 6(1):29-37, Spring 2004.
    • (2004) CryptoBytes , vol.6 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.2    Nyberg, K.3
  • 17
    • 84889452144 scopus 로고    scopus 로고
    • ISO/IEC 10118-3: 2003, Information technology-Security techniques-Entity authentication-Part 6:Mechanism using manual data transfer, International Organization for Standardization, Geneva, Dec
    • ISO/IEC 10118-3: 2003, Information technology-Security techniques-Entity authentication-Part 6:Mechanism using manual data transfer, International Organization for Standardization, Geneva, Dec. 2003.
    • (2003)
  • 18
    • 33646048509 scopus 로고    scopus 로고
    • The personal PKI
    • C. Michell, Ed., Security for Mobility, Institution of Electrical Engineers, London
    • C. Mitchell and R. Schaffelhofer, The personal PKI, in C. Michell, Ed., Security for Mobility, Institution of Electrical Engineers, London, 2004, pp. 35-61.
    • (2004) , pp. 35-61
    • Mitchell, C.1    Schaffelhofer, R.2
  • 19
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier and O. Staffelbach, Fast correlation attacks on certain stream ciphers, Journal of Cryptology, 1:159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 20
    • 84958740066 scopus 로고    scopus 로고
    • Correlation properties of the Bluetooth summation combiner
    • Proceedings of ICISC'99, 1999 International Conference on Information Security and Cryptography, LNCS 1787, Springer, New York
    • M. Hermelin and K. Nyberg, Correlation properties of the Bluetooth summation combiner, in Proceedings of ICISC'99, 1999 International Conference on Information Security and Cryptography, LNCS 1787, Springer, New York, 1999, pp. 17-29.
    • (1999) , pp. 17-29
    • Hermelin, M.1    Nyberg, K.2
  • 21
    • 33745132902 scopus 로고    scopus 로고
    • Some results on correlations in the Bluetooth stream cipher
    • Proceedings of the Tenth Joint Conference on Communications and Coding, Austin, TX
    • P. Ekdahl and T. Johansson, Some results on correlations in the Bluetooth stream cipher, in Proceedings of the Tenth Joint Conference on Communications and Coding, Austin, TX, 2000, p. 16.
    • (2000) , pp. 16
    • Ekdahl, P.1    Johansson, T.2
  • 22
    • 84949226395 scopus 로고    scopus 로고
    • Analysis of the E0 cryptosystem
    • Proceedings of Selected Areas in Cryptography 01, LNCS 2259, Springer, New York
    • S. Fluhrer and S. Lucks, Analysis of the E0 cryptosystem, in Proceedings of Selected Areas in Cryptography 01, LNCS 2259, Springer, New York, 2001, pp. 38-48.
    • (2001) , pp. 38-48
    • Fluhrer, S.1    Lucks, S.2
  • 23
    • 84935039488 scopus 로고    scopus 로고
    • BDD based cryptanalysis of keystream generators
    • Proceedings of Eurocrypt 02, LNCS 2332, Springer, New York
    • M. Krause, BDD based cryptanalysis of keystream generators, in Proceedings of Eurocrypt 02, LNCS 2332, Springer, New York, 2002, pp. 222-237.
    • (2002) , pp. 222-237
    • Krause, M.1
  • 24
    • 35248840147 scopus 로고    scopus 로고
    • Algebraic attacks on combiners with memory
    • Proceedings of Crypto 03, LNCS 2729, Springer, New York
    • F. Armknecht and M. Krause, Algebraic attacks on combiners with memory, in Proceedings of Crypto 03, LNCS 2729, Springer, New York, 2003, pp. 162-175.
    • (2003) , pp. 162-175
    • Armknecht, F.1    Krause, M.2
  • 25
    • 35248849880 scopus 로고    scopus 로고
    • Fast algebraic attacks on stream ciphers with linear feedback
    • Proceedings of Crypto 03, LNCS 2729, Springer, New York
    • N. Courtois, Fast algebraic attacks on stream ciphers with linear feedback, in Proceedings of Crypto 03, LNCS 2729, Springer, New York, 2003, pp. 176-194.
    • (2003) , pp. 176-194
    • Courtois, N.1
  • 26
    • 0009402121 scopus 로고    scopus 로고
    • Bluetooth security architecture
    • White Paper Revision 1.0, Bluetooth SIG, July
    • T. Mueller, Bluetooth security architecture, White Paper Revision 1.0, Bluetooth SIG, July 1999.
    • (1999)
    • Mueller, T.1
  • 27
    • 27944502870 scopus 로고    scopus 로고
    • Serious flaws in Bluetooth security lead to disclosure of personal data
    • Nov
    • A. Laurie, Serious flaws in Bluetooth security lead to disclosure of personal data, http://www.bluestumble.org/, Nov. 2003.
    • (2003)
    • Laurie, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.