Three practical Bluetooth security attacks using new efficient implementations of security analysis tools

  • Authors:
  • Keijo M. J. Haataja

  • Affiliations:
  • University of Kuopio, FIN, Kuopio, Finland

  • Venue:
  • CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

As an interconnection technology, Bluetooth has to address all traditional security problems, well known from the distributed networks. In addition, security issues in wireless ad-hoc networks are much more complex than those of more traditional wired or centralized wireless networks. Moreover, Bluetooth networks are formed by the radio links, which means that there are also additional security aspects whose impact is yet not well understood. In this paper, we describe three practical Bluetooth security attacks using new efficient implementations of security analysis tools. In addition, we demonstrate with experimental figures that using our security analysis tools, attacks against Bluetooth devices become practical. Moreover, we propose countermeasures that render these attacks impractical although not totally eliminating their potential danger.