Man-in-the-middle-attack: Understanding in simple words

A Mallik - Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2019 - jurnal.ar-raniry.ac.id
These days cyber-attack is a serious criminal offense and it is a hot debated issue moreover.
A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

Bias: Bluetooth impersonation attacks

D Antonioli, NO Tippenhauer… - 2020 IEEE symposium …, 2020 - ieeexplore.ieee.org
Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions
of devices. The Bluetooth standard includes a legacy authentication procedure and a secure …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

Sok: The long journey of exploiting and defending the legacy of king harald bluetooth

J Wu, R Wu, D Xu, DJ Tian… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Named after the Viking King Harald Bluetooth, Bluetooth is the de facto standard for short-
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …

When good becomes evil: Tracking bluetooth low energy devices via allowlist-based side channel and its countermeasure

Y Zhang, Z Lin - Proceedings of the 2022 ACM SIGSAC Conference on …, 2022 - dl.acm.org
Bluetooth Low Energy (BLE) is ubiquitous today. To prevent a BLE device (eg, a
smartphone) from being connected by unknown devices, it uses allowlisting to allow the …

BLUFFS: Bluetooth forward and future secrecy attacks and defenses

D Antonioli - Proceedings of the 2023 ACM SIGSAC Conference on …, 2023 - dl.acm.org
Bluetooth is a pervasive technology for wireless communication. Billions of devices use it in
sensitive applications and to exchange private data. The security of Bluetooth depends on …

Internalblue-bluetooth binary patching and experimentation framework

D Mantz, J Classen, M Schulz, M Hollick - Proceedings of the 17th …, 2019 - dl.acm.org
Bluetooth is one of the most established technologies for short range digital wireless data
transmission. With the advent of wearables and the Internet of Things (IoT), Bluetooth has …

Method confusion attack on bluetooth pairing

M Von Tschirschnitz, L Peuckert… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Bluetooth provides encryption, authentication, and integrity protection of its connections.
These protection mechanisms require that Bluetooth devices initially establish trust on first …

Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures

K Haataja, P Toivanen - IEEE Transactions on Wireless …, 2010 - ieeexplore.ieee.org
We propose two new Man-In-The-Middle (MITM) attacks on Bluetooth Secure Simple Pairing
(SSP). The attacks are based on the falsification of information sent during the input/output …