Key negotiation downgrade attacks on bluetooth and bluetooth low energy
Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies specified in the Bluetooth standard. The standard includes key negotiation protocols used to generate long-term keys (during pairing) and session keys (during secure connection establishment). In this work, we demo...
मुख्य लेखकों: | Antonioli, D, Tippenhauer, NO, Rasmussen, K |
---|---|
स्वरूप: | Journal article |
भाषा: | English |
प्रकाशित: |
Association for Computing Machinery
2020
|
समान संसाधन
-
BLURtooth: exploiting cross-transport key derivation in Bluetooth Classic and Bluetooth Low Energy
द्वारा: Antonioli, D, और अन्य
प्रकाशित: (2022) -
BIAS: Bluetooth Impersonation AttackS
द्वारा: Antonioli, D, और अन्य
प्रकाशित: (2020) -
The KNOB is broken: Exploiting low entropy in the encryption key negotiation of Bluetooth BR/EDR
द्वारा: Antonioli, D, और अन्य
प्रकाशित: (2019) -
What's in a downgrade? A taxonomy of downgrade attacks in the TLS protocol and application protocols using TLS
द्वारा: Alashwali, ES, और अन्य
प्रकाशित: (2018) -
Pseudolite with bluetooth low energy beacons
द्वारा: Yong, Maverick Kim Wee
प्रकाशित: (2018)