Title :
Demonstrating vulnerabilities in Bluetooth security
Author :
Hager, Creighton T. ; Midkiff, Scott F.
Author_Institution :
Bradley Dept. of Electr. & Comput. Eng., Virginia Polytech. Inst. & State Univ., Blacksburg, VA, USA
Abstract :
The Bluetooth radio system has been developed to provide mobile ad-hoc connectivity between a wide range of portable and fixed devices. This paper describes the security features of the Bluetooth system and presents an experimental analysis of security vulnerabilities. Vulnerabilities were found as a result of improper validation, exposure, and randomness using a scheme called VERDICT. These vulnerabilities include device address validation, invalid states, and exposed keys.
Keywords :
Bluetooth; ad hoc networks; mobile computing; telecommunication security; Bluetooth radio system; VERDICT; mobile ad-hoc connectivity; security feature; validation exposure randomness deallocation improper conditions taxonomy; Authentication; Bluetooth; Communication standards; Communication system security; Cryptography; Mobile computing; Personal digital assistants; Protocols; Taxonomy; Wireless communication;
Conference_Titel :
Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE
Print_ISBN :
0-7803-7974-8
DOI :
10.1109/GLOCOM.2003.1258472