2001
DOI: 10.1007/3-540-45353-9_14
|View full text |Cite
|
Sign up to set email alerts
|

Security Weaknesses in Bluetooth

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
145
0

Year Published

2004
2004
2013
2013

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 182 publications
(146 citation statements)
references
References 1 publication
1
145
0
Order By: Relevance
“…In [2], some man-in-the-middle and impersonation type of attacks are proposed where the attacker knows or can guess the PIN or existing link key between victims. Relay attacks are similar to man-in-the-middle attacks.…”
Section: Relay Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…In [2], some man-in-the-middle and impersonation type of attacks are proposed where the attacker knows or can guess the PIN or existing link key between victims. Relay attacks are similar to man-in-the-middle attacks.…”
Section: Relay Attacksmentioning
confidence: 99%
“…There exists an adversary located between the sender and receiver, but the only activity of the adversary is to relay information that it receives from one to another without changing the content. Unlike the attacks in [2], the adversary does not need to know a shared secret.…”
Section: Relay Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…They eventually leak such an information by releasing some S and F(S, K i ) for some function F from the protocol. In the Bluetooth case, this attack was described by Jakobsson and Wetzel [17].…”
Section: Bluetooth-like Pre-pairing and The Security Issuementioning
confidence: 97%
“…Bluetooth (v2.0 and older) is known to be subject to searching attack due to its reliance on an arbitrarily human selected passkey [16], and its pairing process generally require a long time which makes it not well user-friendly.…”
Section: Bluetoothmentioning
confidence: 99%