[PDF][PDF] Ten years of bluetooth security attacks: Lessons learned

K Haataja, K Hypponen, P Toivanen - Computer Science I Like, 2011 - erepo.uef.fi
Computer Science I Like, 2011erepo.uef.fi
In this paper, a literature review based comparative analysis of Bluetooth security attacks
over the past ten years (2001-2011) is provided. In addition, a new practical countermeasure
against Man-In-The-Middle attacks on Bluetooth Secure Simple Pairing is proposed.
Moreover, a novel attack that works against all existing Bluetooth versions is proposed.
Furthermore, some new ideas that will be used in our future research work are presented.
Abstract
In this paper, a literature review based comparative analysis of Bluetooth security attacks over the past ten years (2001-2011) is provided. In addition, a new practical countermeasure against Man-In-The-Middle attacks on Bluetooth Secure Simple Pairing is proposed. Moreover, a novel attack that works against all existing Bluetooth versions is proposed. Furthermore, some new ideas that will be used in our future research work are presented.
erepo.uef.fi
以上显示的是最相近的搜索结果。 查看全部搜索结果

Google学术搜索按钮

example.edu/paper.pdf
搜索
获取 PDF 文件
引用
References