2010
DOI: 10.1109/twc.2010.01.090935
|View full text |Cite
|
Sign up to set email alerts
|

Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
49
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 73 publications
(49 citation statements)
references
References 12 publications
0
49
0
Order By: Relevance
“…Distance-bounding is a well-researched area of cryptography [1], [3]- [10], [12], [13], [15], [17]- [20], [23], [24], [26], though the approach in most works is mostly informal. The two formal frameworks due to Avoine et al [3] and Dürholz et al [15] both concur in defining distance-bounding as an authentication protocol where the verifier is convinced that the prover is in its neighborhood.…”
Section: Introductionmentioning
confidence: 99%
“…Distance-bounding is a well-researched area of cryptography [1], [3]- [10], [12], [13], [15], [17]- [20], [23], [24], [26], though the approach in most works is mostly informal. The two formal frameworks due to Avoine et al [3] and Dürholz et al [15] both concur in defining distance-bounding as an authentication protocol where the verifier is convinced that the prover is in its neighborhood.…”
Section: Introductionmentioning
confidence: 99%
“…The protocol specifies the necessary steps for two Bluetooth devices to establish a shared common link for subsequent secure communications (Phan and Mingard, 2012). The SSP protocol consists of the following six phases (Haataja and Toivanen, 2010):  Capabilities exchanged: Devices that are pairing for the first time or are re-pairing, exchange their Input/Output (IO) capabilities in order to determine the appropriate association model to use for the pairing. In the case of mobile devices, which have access to displays and keyboards, the Numeric Comparison (NC) model is used.…”
Section: Bluetooth Technologymentioning
confidence: 99%
“…This is because even if the user correctly checks that the numbers displayed on both devices are equal, they may not necessarily be involved in the same intended session. Haataja et al [7][8][9][10] exploited the fact that prior to SSP the devices exchange their respective input/output capabilities without any authentication, and so describe that one could modify these exchange messages to force devices to use the Just Works (JW) association model whose SSP is not designed to resist MitM attacks, thus leading to an MitM attack on the devices. Raphael and Patrick [3] have done an extensive analysis of the different association models with respect to secure simple pairing in Bluetooth 4.0 for both (BR/EDR) and LE operational modes.…”
Section: Related Workmentioning
confidence: 99%