2019
DOI: 10.1016/j.jisa.2018.11.009
|View full text |Cite
|
Sign up to set email alerts
|

Bluetooth Secure Simple Pairing with enhanced security level

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…For instance, instead of deleting keys, they downright deny connection to new users or allow insecure connections without bonding. The work in [42] details a MITM attack that can be launched against BLE. The authors showed that this vulnerability is due to the fact that a malicious entity can eavesdrop on the public keys of the devices during the initial phase of pairing.…”
Section: Blementioning
confidence: 99%
“…For instance, instead of deleting keys, they downright deny connection to new users or allow insecure connections without bonding. The work in [42] details a MITM attack that can be launched against BLE. The authors showed that this vulnerability is due to the fact that a malicious entity can eavesdrop on the public keys of the devices during the initial phase of pairing.…”
Section: Blementioning
confidence: 99%
“…In the second place, the pairing of devices: for the correct pairing, the Bluetooth devices should be close enough depending on their transmission power and the level of security. It is observed that the higher the level of security, the larger the average time needed to establish a link (see, e.g., [ 20 ]). This may require a few seconds, which is far larger than the microseconds used to transmit data between our RF devices.…”
Section: Introductionmentioning
confidence: 99%
“…However, in security mode 4, Secure Simple Pairing (SSP) is used instead. A series of works such as [8][9][10][11] address the security properties of SSP under the distinctive practical concerns. Authentication: this procedure applies to two paired devices and needs their shared link key generated by the previous procedure.…”
Section: Introductionmentioning
confidence: 99%