DocumentCode
2469656
Title
Demonstrating vulnerabilities in Bluetooth security
Author
Hager, Creighton T. ; Midkiff, Scott F.
Author_Institution
Bradley Dept. of Electr. & Comput. Eng., Virginia Polytech. Inst. & State Univ., Blacksburg, VA, USA
Volume
3
fYear
2003
fDate
1-5 Dec. 2003
Firstpage
1420
Abstract
The Bluetooth radio system has been developed to provide mobile ad-hoc connectivity between a wide range of portable and fixed devices. This paper describes the security features of the Bluetooth system and presents an experimental analysis of security vulnerabilities. Vulnerabilities were found as a result of improper validation, exposure, and randomness using a scheme called VERDICT. These vulnerabilities include device address validation, invalid states, and exposed keys.
Keywords
Bluetooth; ad hoc networks; mobile computing; telecommunication security; Bluetooth radio system; VERDICT; mobile ad-hoc connectivity; security feature; validation exposure randomness deallocation improper conditions taxonomy; Authentication; Bluetooth; Communication standards; Communication system security; Cryptography; Mobile computing; Personal digital assistants; Protocols; Taxonomy; Wireless communication;
fLanguage
English
Publisher
ieee
Conference_Titel
Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE
Print_ISBN
0-7803-7974-8
Type
conf
DOI
10.1109/GLOCOM.2003.1258472
Filename
1258472
Link To Document