Security and Privacy Protection for Bluetooth

碩士 === 明新科技大學 === 資訊管理研究所 === 96 === Bluetooth, a short range wireless communication standard, has made possible a number of digital devices totally free from being bonded to wires and cables. It’s application which used to serve mostly cell phones and headsets has widely extended to PCs and PDAs. G...

Full description

Bibliographic Details
Main Authors: Jian-Ren Peng, 彭建仁
Other Authors: Tzu-Chang Yeh
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/65814659365191496151
id ndltd-TW-096MHIT5396012
record_format oai_dc
spelling ndltd-TW-096MHIT53960122015-11-09T04:04:48Z http://ndltd.ncl.edu.tw/handle/65814659365191496151 Security and Privacy Protection for Bluetooth 藍牙的安全及隱私保護 Jian-Ren Peng 彭建仁 碩士 明新科技大學 資訊管理研究所 96 Bluetooth, a short range wireless communication standard, has made possible a number of digital devices totally free from being bonded to wires and cables. It’s application which used to serve mostly cell phones and headsets has widely extended to PCs and PDAs. Given the data transferred has come to a greater degree of sensitivity, security issues involving Bluetooth transmission have raised many concerns. However, during the authentication and key exchange process of Bluetooth communication, a lot of information is transferred in plaintext, which allows a malicious third party to spoof the legal Bluetooth device to make it through the authentication, or to deduce the encryption key to eavesdrop the transferring data. The revised version of standard, Bluetooth V2.1, came forth in 2007 with a new security mechanism, Secure Simple Pairing, which seemly eradicated the problems legacy pairing had missed out such as spoofing attacks and eavesdropping attacks. However, as authentication is done by visual confirming on displayed 6-digit numbers to avoid man-in-the-middle attacks, there are quite a few instances of user error that will result in security and privacy breaches. This paper will introduce and analyze the security mechanism of Bluetooth first, then discuss the security drawbacks on this mechanism, and finally an improved scheme is proposed that could be applied in high security demanding applications. Tzu-Chang Yeh 葉慈章 2008 學位論文 ; thesis 76 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 明新科技大學 === 資訊管理研究所 === 96 === Bluetooth, a short range wireless communication standard, has made possible a number of digital devices totally free from being bonded to wires and cables. It’s application which used to serve mostly cell phones and headsets has widely extended to PCs and PDAs. Given the data transferred has come to a greater degree of sensitivity, security issues involving Bluetooth transmission have raised many concerns. However, during the authentication and key exchange process of Bluetooth communication, a lot of information is transferred in plaintext, which allows a malicious third party to spoof the legal Bluetooth device to make it through the authentication, or to deduce the encryption key to eavesdrop the transferring data. The revised version of standard, Bluetooth V2.1, came forth in 2007 with a new security mechanism, Secure Simple Pairing, which seemly eradicated the problems legacy pairing had missed out such as spoofing attacks and eavesdropping attacks. However, as authentication is done by visual confirming on displayed 6-digit numbers to avoid man-in-the-middle attacks, there are quite a few instances of user error that will result in security and privacy breaches. This paper will introduce and analyze the security mechanism of Bluetooth first, then discuss the security drawbacks on this mechanism, and finally an improved scheme is proposed that could be applied in high security demanding applications.
author2 Tzu-Chang Yeh
author_facet Tzu-Chang Yeh
Jian-Ren Peng
彭建仁
author Jian-Ren Peng
彭建仁
spellingShingle Jian-Ren Peng
彭建仁
Security and Privacy Protection for Bluetooth
author_sort Jian-Ren Peng
title Security and Privacy Protection for Bluetooth
title_short Security and Privacy Protection for Bluetooth
title_full Security and Privacy Protection for Bluetooth
title_fullStr Security and Privacy Protection for Bluetooth
title_full_unstemmed Security and Privacy Protection for Bluetooth
title_sort security and privacy protection for bluetooth
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/65814659365191496151
work_keys_str_mv AT jianrenpeng securityandprivacyprotectionforbluetooth
AT péngjiànrén securityandprivacyprotectionforbluetooth
AT jianrenpeng lányádeānquánjíyǐnsībǎohù
AT péngjiànrén lányádeānquánjíyǐnsībǎohù
_version_ 1718126527419252736