TY - GEN
T1 - Attacks on bluetooth security architecture and its countermeasures
AU - Iqbal, Mian Muhammad Waseem
AU - Kausar, Firdous
AU - Wahla, Muhammad Arif
PY - 2010
Y1 - 2010
N2 - WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.
AB - WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.
UR - http://www.scopus.com/inward/record.url?scp=77957935605&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77957935605&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-13365-7_18
DO - 10.1007/978-3-642-13365-7_18
M3 - Conference contribution
AN - SCOPUS:77957935605
SN - 3642133649
SN - 9783642133640
T3 - Communications in Computer and Information Science
SP - 190
EP - 197
BT - Information Security and Assurance - 4th International Conference, ISA 2010, Proceedings
T2 - 4th International Conference on Information Security and Assurance, ISA 2010
Y2 - 23 June 2010 through 25 June 2010
ER -