Key negotiation downgrade attacks on bluetooth and bluetooth low energy
Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies specified in the Bluetooth standard. The standard includes key negotiation protocols used to generate long-term keys (during pairing) and session keys (during secure connection establishment). In this work, we demo...
Main Authors: | Antonioli, D, Tippenhauer, NO, Rasmussen, K |
---|---|
Format: | Journal article |
Language: | English |
Published: |
Association for Computing Machinery
2020
|
Similar Items
-
BLURtooth: exploiting cross-transport key derivation in Bluetooth Classic and Bluetooth Low Energy
by: Antonioli, D, et al.
Published: (2022) -
BIAS: Bluetooth Impersonation AttackS
by: Antonioli, D, et al.
Published: (2020) -
The KNOB is broken: Exploiting low entropy in the encryption key negotiation of Bluetooth BR/EDR
by: Antonioli, D, et al.
Published: (2019) -
Pseudolite with bluetooth low energy beacons
by: Yong, Maverick Kim Wee
Published: (2018) -
What's in a downgrade? A taxonomy of downgrade attacks in the TLS protocol and application protocols using TLS
by: Alashwali, ES, et al.
Published: (2018)