Three Practical Bluetooth Security Attacks using New Efficient Implementations of Security Analysis Tools

K.M.J. Haataja (Finland)

Keywords

Authentication, Authorization, Bluetooth, Denialof Service attack, Security Analysis Tool, Wireless Security

Abstract

As an interconnection technology, Bluetooth has to ad dress all traditional security problems, well known from the distributed networks. In addition, security issues in wireless ad-hoc networks are much more complex than those of more traditional wired or centralized wireless net works. Moreover, Bluetooth networks are formed by the radio links, which means that there are also additional se curity aspects whose impact is yet not well understood. In this paper, we describe three practical Bluetooth secu rity attacks using new efficient implementations of security analysis tools. In addition, we demonstrate with experi mental figures that using our security analysis tools, attacks against Bluetooth devices become practical. Moreover, we propose countermeasures that render these attacks imprac tical although not totally eliminating their potential danger.

Important Links:



Go Back