2012 Fourth International Conference on Computational Intelligence and Communication Networks 2012
DOI: 10.1109/cicn.2012.72
|View full text |Cite
|
Sign up to set email alerts
|

Contention for Man-in-the-Middle Attacks in Bluetooth Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…The simplest and cheapest intervention to fight MITM attacks is to compel devices to recognize only authenticated connection keys [28,29] . The definition of a secure database is a registry that includes an entry for each system and the security requirements of that company.…”
Section: Bluetooth Attacks Preventionmentioning
confidence: 99%
“…The simplest and cheapest intervention to fight MITM attacks is to compel devices to recognize only authenticated connection keys [28,29] . The definition of a secure database is a registry that includes an entry for each system and the security requirements of that company.…”
Section: Bluetooth Attacks Preventionmentioning
confidence: 99%
“…Another type of SSP attack needs a visual contact with the victim's Bluetooth devices (such as direct line-of-sight or possibly a video camera that is hidden) to guarantee that a lower security association model choice is made by the Bluetooth device user. Once the attacker (MITM) has visual access to the victim's devices, the attacker acts before the legitimate user to establish Bluetooth connections to both victims' devices and to initiate the IO phase in which the less secure association model can be forcefully selected [31].…”
Section: • Mac Spoofingmentioning
confidence: 99%
“…Many writers have researched the Bluetooth man-in-the-middle (MITM) attack scenario to better comprehend these types of assaults. In keeping with this, these writers have offered a variety of risk-reduction techniques that may be used by both individuals and organizations [9][10][11]. A thorough description of the many Bluetooth attack vectors, including worms, Trojans, DDoS assaults, MITM attacks, and more, is given [7,12,13].…”
Section: Introductionmentioning
confidence: 99%