Relay attacks on bluetooth authentication and solutions

Warning The system is temporarily closed to updates for reporting purpose.

Levi, Albert and Çetintaş, Erhan and Aydos, Murat and Koç, Çetin Kaya and Çağlayan, M. Ufuk (2004) Relay attacks on bluetooth authentication and solutions. Lecture notes in computer science, 3280 . 278 - 288. ISSN 0302-9743 (Print) 1611-3349 (Online)

Full text not available from this repository. (Request a copy)

Abstract

We describe relay attacks on Bluetooth authentication protocol. The aim of these attacks is impersonation. The attacker does not need to guess or obtain a common secret known to both victims in order to set up these attacks, merely to relay the information it receives from one victim to the other during the authentication protocol run. Bluetooth authentication protocol allows such a relay if the victims do not hear each other. Such a setting is highly probable. We analyze the attacks for several scenarios and propose practical solutions. Moreover, we simulate attacks to make sure about their feasibility. These simulations show that current Bluetooth specifications do not have defensive mechanisms for relay attacks. However, relay attacks create a significant partial delay during the connection that might be useful for detection.
Item Type: Article
Additional Information: 19th International Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings / Book: Computer and Information Sciences - ISCIS 2004 / Category: Computer Networks and Security / ISBN: 978-3-540-23526-2
Subjects: Q Science > QA Mathematics > QA075 Electronic computers. Computer science
Divisions: Faculty of Engineering and Natural Sciences
Depositing User: Albert Levi
Date Deposited: 13 Oct 2005 03:00
Last Modified: 17 Sep 2019 16:41
URI: https://research.sabanciuniv.edu/id/eprint/344

Actions (login required)

View Item
View Item