BlueSniff: Eve Meets Alice and Bluetooth

نویسندگان

  • Dominic Spill
  • Andrea Bittau
چکیده

Much of Bluetooth’s data remains confidential in practice due to the difficulty of eavesdropping it. We present mechanisms for doing so, therefore eliminating the data confidentiality properties of the protocol. As an additional security measure, devices often operate in “undiscoverable mode” in order to hide their identity and provide access control. We show how the full MAC address of such master devices can be obtained, therefore bypassing the access control of this feature. Our work results in the first open-source Bluetooth sniffer.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantization and LLR Computation for Physical Layer Security

While computational security algorithms usually reside in upper protocol layers and rely on the assumption of limited processing capabilities of a potential eavesdropper, physicallayer key generation aims at providing secrecy in the more information-theoretic sense, as introduced by Shannon [?]. Thus, by sharing a previously known secret key, such as a one-time pad, two legitimate users, Alice ...

متن کامل

1 S

The protocol is, however, susceptible to a man-in-the-middle attack [3], in which the adversary (Eve) intercepts a message from Alice and creates a new message to send to Bob (Fig.1). Eve performs the exchange with Alice using the original message, while Bob performs the exchange using the newly created message. At the final stage, Eve has the original message in decrypted form, while Bob has t...

متن کامل

Circuit model for mode conversion in coplanar waveguide asymmetric shunt impedances - Electronics Letters

Eve is active, we need to determine the upper bound on the probability of the event that Alice and Bob do not both reject although secret-key agreement has not been successful. There are two cases in which this can occur: one is where Eve successfully guesses a = &(S) to impersonate Bob and makes Alice accept. The other case is where, after Eve saw&(S), she successfully guesses c = f,(S) to imp...

متن کامل

Practical Secret Sharing in Fast Fading Channels based on Reliability-Based Hybrid ARQ

Consider a wireless communication system in which Alice wishes to transmit a message to Bob in the presence of an eavesdropper, Eve. We consider the design of a communication technique that allows Alice to send a message such that Bob can decode it but Eve can get little information about the message. This scenario is a classic example of the wiretap channel, for which several researchers have ...

متن کامل

Symmetric Incoherent Eavesdropping against MDI QKD

In this paper, we concentrate on the very recently proposed Measurement Device Independent Quantum Key Distribution (MDI QKD) protocol by Lo, Curty and Qi (PRL, 2012). In this protocol, a secret key is established between Alice and Bob with the help of an untrusted third-party called Eve. We study how one can suitably mount a symmetric incoherent eavesdropping strategy on MDI QKD considering th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007