Download Bluetooth Security Attacks: Comparative Analysis, Attacks, by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka PDF

By Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen

Bluetooth expertise has loved large good fortune, and it is now hired in billions of units for short-range instant facts and real-time audio or video move. during this publication the authors offer an outline of Bluetooth safeguard. They research community vulnerabilities and supply a literature-review comparative research of contemporary protection assaults. They research and clarify comparable countermeasures, together with one according to safe easy pairing, and so they suggest a unique assault that works opposed to all current Bluetooth models. They finish with a dialogue on destiny study instructions.

The publication is acceptable for practitioners and researchers in details protection, particularly these engaged within the layout of networked and cellular devices.

Show description

Read or Download Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures PDF

Best network security books

Netcat Power Tools

Initially published in 1996, Netcat is a netowrking software designed to learn and write information throughout either Transmission keep an eye on Protocol TCP and consumer Datagram Protocol (UDP) connections utilizing the TCP/Internet Protocol (IP) protocol suite. Netcat is frequently known as a "Swiss military knife" software, and for reliable cause.

Information security management handbook

A compilation of the elemental wisdom, talents, recommendations, and instruments require by means of all defense pros, details safeguard guide, 6th variation units the traditional on which all IT defense courses and certifications are dependent. thought of the gold-standard reference of knowledge protection, quantity 2 contains insurance of every area of the typical physique of information, the traditional of data required by way of IT safety execs around the globe.

Security Engineering for Vehicular IT Systems

Even supposing such a lot vehicular IT platforms are certainly constructed to stand technical mess ups, they infrequently think of a scientific malicious encroachment. despite the fact that, within the measure that vehicular electronics have gotten software-driven, digitally networked and interactive IT platforms, liable security features are necessary to make sure using safeguard and permit the car to accomplish various felony necessities.

Cybersecurity in Switzerland

Provides the reader a close account of the way cyber-security in Switzerland has advanced through the years, utilizing authentic records and a large amount of within wisdom. It specializes in key principles, institutional preparations, at the book of technique papers, and importantly, on methods top as much as those method files.

Additional resources for Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures

Sample text

A BlueBugging attack is very dangerous, because millions of vulnerable Bluetooth devices [33, 34, 45–48], especially Bluetooth mobile phones, are used every day all over the world [2, 61]. Blooover [66] and its successor Blooover II [67] are derived from Bluetooth Hoover, because they run on handheld devices, such as PDAs or mobile phones, and are capable of stealing sensitive information by using a BlueBugging attack [2, 64]. A Blooovering attack [66, 67] can be done secretly by using only a Bluetooth mobile phone with Blooover or Blooover II installed.

We used CATC Scripting Language to create our Brute-Force BD_ADDR Scanning Script, which works in the following way [2, 41]: 1. Set the scanning area. 2. , set a BD_ADDR value for the next connection attempt. 3. Try to create a basic ACL link between the protocol analyzer and a remote device by using the BD_ADDR value set in step 2. If the connection attempt fails, go back to step 2. Otherwise, the Brute-Force BD_ADDR Scanning Script has found a non-discoverable device (see Chap. 2). 4. Perform a remote name inquiry and a disconnection with the target device.

This takes up to a second, because both devices have unique hopping patterns and these patterns need to coincide on a 30 4 Comparative Analysis of Bluetooth Security Attacks frequency before communication can take place. 3 min) to find a hidden Bluetooth device in the range of vulnerability. Moreover, IEEE’s OUI database [5] (see Chap. 2) can be used to make educated guesses regarding the last byte of the NAP rather than blindly brute-forcing it. Typically, filtering the OUI list for vendor prefixes yields only a few dozen brute-force candidates, thus further reducing the time requirement.

Download PDF sample

Rated 4.70 of 5 – based on 31 votes