• DocumentCode
    2469656
  • Title

    Demonstrating vulnerabilities in Bluetooth security

  • Author

    Hager, Creighton T. ; Midkiff, Scott F.

  • Author_Institution
    Bradley Dept. of Electr. & Comput. Eng., Virginia Polytech. Inst. & State Univ., Blacksburg, VA, USA
  • Volume
    3
  • fYear
    2003
  • fDate
    1-5 Dec. 2003
  • Firstpage
    1420
  • Abstract
    The Bluetooth radio system has been developed to provide mobile ad-hoc connectivity between a wide range of portable and fixed devices. This paper describes the security features of the Bluetooth system and presents an experimental analysis of security vulnerabilities. Vulnerabilities were found as a result of improper validation, exposure, and randomness using a scheme called VERDICT. These vulnerabilities include device address validation, invalid states, and exposed keys.
  • Keywords
    Bluetooth; ad hoc networks; mobile computing; telecommunication security; Bluetooth radio system; VERDICT; mobile ad-hoc connectivity; security feature; validation exposure randomness deallocation improper conditions taxonomy; Authentication; Bluetooth; Communication standards; Communication system security; Cryptography; Mobile computing; Personal digital assistants; Protocols; Taxonomy; Wireless communication;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE
  • Print_ISBN
    0-7803-7974-8
  • Type

    conf

  • DOI
    10.1109/GLOCOM.2003.1258472
  • Filename
    1258472