{"title":"蓝牙安全-需要提高配对效率","authors":"P. Suri, S. Rani","doi":"10.1109/SECON.2008.4494365","DOIUrl":null,"url":null,"abstract":"This paper focuses on the mechanism of Bluetooth authentication. When two units want to communicate in a secure way, they need to be paired to each other. In the pairing process units are exchanging keys and authenticate each other. We have mentioned about bluetooth security breaks and holes used by the attacker. Finally this paper ends with countermeasures of the attack.","PeriodicalId":188817,"journal":{"name":"IEEE SoutheastCon 2008","volume":"262 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Bluetooth security - Need to increase the efficiency in pairing\",\"authors\":\"P. Suri, S. Rani\",\"doi\":\"10.1109/SECON.2008.4494365\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper focuses on the mechanism of Bluetooth authentication. When two units want to communicate in a secure way, they need to be paired to each other. In the pairing process units are exchanging keys and authenticate each other. We have mentioned about bluetooth security breaks and holes used by the attacker. Finally this paper ends with countermeasures of the attack.\",\"PeriodicalId\":188817,\"journal\":{\"name\":\"IEEE SoutheastCon 2008\",\"volume\":\"262 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE SoutheastCon 2008\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECON.2008.4494365\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE SoutheastCon 2008","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2008.4494365","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Bluetooth security - Need to increase the efficiency in pairing
This paper focuses on the mechanism of Bluetooth authentication. When two units want to communicate in a secure way, they need to be paired to each other. In the pairing process units are exchanging keys and authenticate each other. We have mentioned about bluetooth security breaks and holes used by the attacker. Finally this paper ends with countermeasures of the attack.