2007 3rd IEEE/IFIP International Conference in Central Asia on Internet 2007
DOI: 10.1109/canet.2007.4401672
|View full text |Cite
|
Sign up to set email alerts
|

“Nino” man-in-the-middle attack on bluetooth secure simple pairing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
34
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 37 publications
(34 citation statements)
references
References 1 publication
0
34
0
Order By: Relevance
“…SSP uses four association models: OOB, Numeric Comparison, Passkey Entry, and Just Works (see Chap. However, it has been shown that MITM attacks against Bluetooth 2.1+EDR/3.0+HS/4.0 devices are possible by forcing the victim devices to use the Just Works association model [2,[9][10][11][12][13][14][15][16][17][18][19][20][21][22][23] (see Chap. The choice of association model depends on the device's IO capabilities (see Table 2.1 in Chap.…”
Section: Weaknesses In Association Models Of Sspmentioning
confidence: 99%
See 2 more Smart Citations
“…SSP uses four association models: OOB, Numeric Comparison, Passkey Entry, and Just Works (see Chap. However, it has been shown that MITM attacks against Bluetooth 2.1+EDR/3.0+HS/4.0 devices are possible by forcing the victim devices to use the Just Works association model [2,[9][10][11][12][13][14][15][16][17][18][19][20][21][22][23] (see Chap. The choice of association model depends on the device's IO capabilities (see Table 2.1 in Chap.…”
Section: Weaknesses In Association Models Of Sspmentioning
confidence: 99%
“…The attacking device is set to require authentication and encryption for each connection with the printer (see rows [14][15]. After the successful authentication with the printer (see rows [19][20][21][22][23][24][25], the attacking device abuses it by printing funny pictures, dozens of pages of random text, and various hoax documents (see rows [26][27][28]. After the successful authentication with the printer (see rows [19][20][21][22][23][24][25], the attacking device abuses it by printing funny pictures, dozens of pages of random text, and various hoax documents (see rows [26][27][28].…”
Section: Multithreatsmentioning
confidence: 99%
See 1 more Smart Citation
“…This is because even if the user correctly checks that the numbers displayed on both devices are equal, they may not necessarily be involved in the same intended session. Haataja et al [7][8][9][10] exploited the fact that prior to SSP the devices exchange their respective input/output capabilities without any authentication, and so describe that one could modify these exchange messages to force devices to use the Just Works (JW) association model whose SSP is not designed to resist MitM attacks, thus leading to an MitM attack on the devices. Raphael and Patrick [3] have done an extensive analysis of the different association models with respect to secure simple pairing in Bluetooth 4.0 for both (BR/EDR) and LE operational modes.…”
Section: Related Workmentioning
confidence: 99%
“…This is because even if the user correctly checks that the numbers displayed on both devices are equal, they may not necessarily be involved in the same intended session. Haataja et al [10,11,8,9] exploited the fact that prior to SSP the devices exchange their respective input/output capabilities without any authentication, and so describe that one could modify these exchange messages to force devices to use the Just Works (JW) association model whose SSP is not designed to resist MitM attacks, thus leading to an MitM attack on the devices.…”
Section: Related Workmentioning
confidence: 99%