Key negotiation downgrade attacks on bluetooth and bluetooth low energy
Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies specified in the Bluetooth standard. The standard includes key negotiation protocols used to generate long-term keys (during pairing) and session keys (during secure connection establishment). In this work, we demo...
Main Authors: | Antonioli, D, Tippenhauer, NO, Rasmussen, K |
---|---|
Format: | Journal article |
Language: | English |
Published: |
Association for Computing Machinery
2020
|
Similar Items
-
BLURtooth: exploiting cross-transport key derivation in Bluetooth Classic and Bluetooth Low Energy
by: Antonioli, D, et al.
Published: (2022) -
BIAS: Bluetooth Impersonation AttackS
by: Antonioli, D, et al.
Published: (2020) -
The KNOB is broken: Exploiting low entropy in the encryption key negotiation of Bluetooth BR/EDR
by: Antonioli, D, et al.
Published: (2019) -
Inside Bluetooth Low Energy /
by: Gupta, Naresh C. (Naresh Chand)
Published: (2013) -
Address Privacy of Bluetooth Low Energy
by: Dazhi Sun, et al.
Published: (2022-11-01)