Key negotiation downgrade attacks on bluetooth and bluetooth low energy
Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies specified in the Bluetooth standard. The standard includes key negotiation protocols used to generate long-term keys (during pairing) and session keys (during secure connection establishment). In this work, we demo...
Main Authors: | Antonioli, D, Tippenhauer, NO, Rasmussen, K |
---|---|
Format: | Journal article |
Sprog: | English |
Udgivet: |
Association for Computing Machinery
2020
|
Lignende værker
-
BLURtooth: exploiting cross-transport key derivation in Bluetooth Classic and Bluetooth Low Energy
af: Antonioli, D, et al.
Udgivet: (2022) -
BIAS: Bluetooth Impersonation AttackS
af: Antonioli, D, et al.
Udgivet: (2020) -
The KNOB is broken: Exploiting low entropy in the encryption key negotiation of Bluetooth BR/EDR
af: Antonioli, D, et al.
Udgivet: (2019) -
What's in a downgrade? A taxonomy of downgrade attacks in the TLS protocol and application protocols using TLS
af: Alashwali, ES, et al.
Udgivet: (2018) -
Pseudolite with bluetooth low energy beacons
af: Yong, Maverick Kim Wee
Udgivet: (2018)