期刊名称:International Journal of Security and Its Applications
印刷版ISSN:1738-9976
出版年度:2014
卷号:8
期号:3
页码:1-8
DOI:10.14257/ijsia.2014.8.3.01
出版社:SERSC
摘要:Bluetooth technology has become an integral part of this modern society. Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. Bluetooth communication range is categorized as high, medium and low depending upon power level. High range of Bluetooth communication is up to 91 meter, medium range is up to 9 meter and low range is up to 1 meter. Authentication and Encryption are the key security features that are used in Bluetooth communication. In this paper, we present architecture for authentication security of Bluetooth. The main goal of this paper is to design architecture of security for Bluetooth in real scenarios. In order to find out the major vulnerabilities in modern wireless Bluetooth-enabled devices that has performed successfully for several attacks such as Unauthorized Direct Data Access (UDDA) and Man-in-the-Middle Attack (MITM). This form of authentication presents an interesting modeling challenge. We discuss the implications of this authentication security for typical Bluetooth usage scenarios.
关键词:Bluetooth Security; MITM; UDDA; SIG; ACO; Link Key; PIN