DocumentCode
653292
Title
Pairing and Authentication Security Technologies in Low-Power Bluetooth
Author
JunFeng Xu ; Tao Zhang ; Dong Lin ; Ye Mao ; Xiaonan Liu ; Shiwu Chen ; Shuai Shao ; Bin Tian ; Shengwei Yi
Author_Institution
China Inf. Technol. Security Evaluation Center, Beijing, China
fYear
2013
fDate
20-23 Aug. 2013
Firstpage
1081
Lastpage
1085
Abstract
With the release of up-to-date Low-Power (LP) bluetooth 4.0, Bluetooth Technologies are not only widely deployed on personal area devices such as the smart phone, the headset, the intelligent health-care equipment etc., but also are recommended as a standard communication protocol in the Internet of Things. However, due to the inherent limitation in the bluetooth protocol, the network designer must face critical vulnerabilities which might bring serious security issues. This paper describes the security features of the bluetooth 4.0 protocol and analyses pairing and authentication security technology in the LP bluetooth 4.0. The security vulnerabilities and security recommendations concerning to the pairing and authentication process of the bluetooth devices are presented. In the end, the countermeasures are proposed to mitigate the risk.
Keywords
Bluetooth; Internet of Things; protocols; smart phones; telecommunication security; Bluetooth 4.0 protocol; Internet of Things; authentication security technology; communication protocol; intelligent health care equipment; low-power Bluetooth; pairing security; personal area devices; smart phone; Authentication; Bluetooth; Conferences; Encryption; Protocols; Bluetooth 4.0; High Speed; Information Technology Security; Low-Power; Vulnerability;
fLanguage
English
Publisher
ieee
Conference_Titel
Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing
Conference_Location
Beijing
Type
conf
DOI
10.1109/GreenCom-iThings-CPSCom.2013.185
Filename
6682199
Link To Document