Security and Privacy Protection for Bluetooth
碩士 === 明新科技大學 === 資訊管理研究所 === 96 === Bluetooth, a short range wireless communication standard, has made possible a number of digital devices totally free from being bonded to wires and cables. It’s application which used to serve mostly cell phones and headsets has widely extended to PCs and PDAs. G...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/65814659365191496151 |
id |
ndltd-TW-096MHIT5396012 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096MHIT53960122015-11-09T04:04:48Z http://ndltd.ncl.edu.tw/handle/65814659365191496151 Security and Privacy Protection for Bluetooth 藍牙的安全及隱私保護 Jian-Ren Peng 彭建仁 碩士 明新科技大學 資訊管理研究所 96 Bluetooth, a short range wireless communication standard, has made possible a number of digital devices totally free from being bonded to wires and cables. It’s application which used to serve mostly cell phones and headsets has widely extended to PCs and PDAs. Given the data transferred has come to a greater degree of sensitivity, security issues involving Bluetooth transmission have raised many concerns. However, during the authentication and key exchange process of Bluetooth communication, a lot of information is transferred in plaintext, which allows a malicious third party to spoof the legal Bluetooth device to make it through the authentication, or to deduce the encryption key to eavesdrop the transferring data. The revised version of standard, Bluetooth V2.1, came forth in 2007 with a new security mechanism, Secure Simple Pairing, which seemly eradicated the problems legacy pairing had missed out such as spoofing attacks and eavesdropping attacks. However, as authentication is done by visual confirming on displayed 6-digit numbers to avoid man-in-the-middle attacks, there are quite a few instances of user error that will result in security and privacy breaches. This paper will introduce and analyze the security mechanism of Bluetooth first, then discuss the security drawbacks on this mechanism, and finally an improved scheme is proposed that could be applied in high security demanding applications. Tzu-Chang Yeh 葉慈章 2008 學位論文 ; thesis 76 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 明新科技大學 === 資訊管理研究所 === 96 === Bluetooth, a short range wireless communication standard, has made possible a number of digital devices totally free from being bonded to wires and cables. It’s application which used to serve mostly cell phones and headsets has widely extended to PCs and PDAs. Given the data transferred has come to a greater degree of sensitivity, security issues involving Bluetooth transmission have raised many concerns. However, during the authentication and key exchange process of Bluetooth communication, a lot of information is transferred in plaintext, which allows a malicious third party to spoof the legal Bluetooth device to make it through the authentication, or to deduce the encryption key to eavesdrop the transferring data. The revised version of standard, Bluetooth V2.1, came forth in 2007 with a new security mechanism, Secure Simple Pairing, which seemly eradicated the problems legacy pairing had missed out such as spoofing attacks and eavesdropping attacks. However, as authentication is done by visual confirming on displayed 6-digit numbers to avoid man-in-the-middle attacks, there are quite a few instances of user error that will result in security and privacy breaches.
This paper will introduce and analyze the security mechanism of Bluetooth first, then discuss the security drawbacks on this mechanism, and finally an improved scheme is proposed that could be applied in high security demanding applications.
|
author2 |
Tzu-Chang Yeh |
author_facet |
Tzu-Chang Yeh Jian-Ren Peng 彭建仁 |
author |
Jian-Ren Peng 彭建仁 |
spellingShingle |
Jian-Ren Peng 彭建仁 Security and Privacy Protection for Bluetooth |
author_sort |
Jian-Ren Peng |
title |
Security and Privacy Protection for Bluetooth |
title_short |
Security and Privacy Protection for Bluetooth |
title_full |
Security and Privacy Protection for Bluetooth |
title_fullStr |
Security and Privacy Protection for Bluetooth |
title_full_unstemmed |
Security and Privacy Protection for Bluetooth |
title_sort |
security and privacy protection for bluetooth |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/65814659365191496151 |
work_keys_str_mv |
AT jianrenpeng securityandprivacyprotectionforbluetooth AT péngjiànrén securityandprivacyprotectionforbluetooth AT jianrenpeng lányádeānquánjíyǐnsībǎohù AT péngjiànrén lányádeānquánjíyǐnsībǎohù |
_version_ |
1718126527419252736 |