Abstract
This chapter is concerned with security management in Bluetooth communication. The chapter begins with description of the development of Bluetooth and its technical specifications. It continues with a discussion of the various network structures that can be developed through Bluetooth. A discussion of Bluetooth security goals leads to a description of the different security models available. We conclude with a discussion of the more prevalent attacks on Bluetooth security and the most widely used procedures for mitigating such attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Scarfone K, Padgette J (2008) Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology. Special Publication 800-121, National Institute of Standards and Technology (NIST), U.S. Department of Commerce.
Vainio J (2000) Bluetooth Security. Helsinki University of Technology. http: //www.cse.tkk.fi/fi/opinnot/T-110.5190/2000/bluetooth security/bluesec. html. Accessed 16 June, 2011.
Bialoglowy M (2011) Bluetooth Security Review, Part I. Retrieved from http://www.syman tec.com/connect/articles/bluetooth-security-review-part-1. Accessed, 19 June, 2011.
Bluetooth Special Interest Group (2011) Specification of the Bluetooth System (Core Package version 4). Retrieved from http://www.bluetooth.com. Accessed 6 November, 2011.
Gehramnn C (2011) Bluetooth Security White Paper. Bluetooth SIG Security Expert Group. Retrieved from http://grouper.ieee.org/groups/1451/5/ Comparison%20of%20PHY/Bluetooth 24Security Paper.pdf. Accessed 19 June, 2011.
Bluetooth Security (2011) Retrieved from http://en.wikipedia.org/wiki/ Bluetooth#Security from Wikipedia. Accessed 19 June, 2011.
Shaked Y, Wool A (2005) Cracking the Bluetooth PIN. 3rd USENIX/ACM conf. Mobile Systems, Applications, and Services (MobiSys), pp. 39–50.
Björnsson M (2001) Retrieved from http://www.lysator.liu.se/~martinb/ Bluetooth/Bluetooth in Secure Products.html#Toc520619560. Accessed 19 June, 2011.
El-Hadidi M, Sayegh A (2005) A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems. International Conference on Security and Privacy for Emerging Areas in Communications Network, pp. 261–269.
Jasobsson M, Wetzel S (2001) SecurityWeaknesses in Bluetooth. CT-RSA’01. LNCS 2020: 176–191. Springer-Verlag, Berlin.
Bakshi A (2007) Bluetooth Secure Simple Pairing. Retrieved from http:// www.wireless designmag.com/PDFs/2007/1207/wd712 coverstory.pdf. Accessed 16 October, 2011.
SIM Access Profile (SAP) (2011) Retrieved from http://www.palowireless. com/infotooth/ tutorial /n12 sap.asp. Accessed 16 October, 2011.
Simple Pairing Whitepaper (2011) Retrieved from http://mclean-linsky. net/joel/cv/Simple% 20Pairing WP V10r00.pdf. Accessed 16 October, 2011.
Pasanen S, Toivanen P, Haataja K, Paivinen N (2010) New Efficient RF Fingerprint-Based Security Solution for Bluetooth Secure Simple Pairing. Hawaii International Conference on System Sciences, pp. 1–8.
Near Field Communication (2011) Retrieved from http://en.wikipedia.org/ wiki/Near field communication. Accessed 16 October, 2011.
What is NFC (2011) Retrieved from http://www.nfc-forum.org/aboutnfc/. Accessed 16 October, 2011.
Xin Y, Ting Y (2009) A Security Architecture Based on User Authentication of Bluetooth. International forum on Information Technology and Applications, pp. 627–629.
Rowe M, Hurman T (2011) Bluetooth Security: Issues, threats and consequences. Retrieved from http://www.pentest.co.uk/documents/wbf slides.pdf. Accessed 19 June, 2011.
Bluetooth Security Mechanisms (2011) Seguridad Mobile. Retrieved from http://www.seg uridadmobile.com/bluetooth/bluetooth-security/securitymechanisms. html. Accessed 19 June, 2011.
Levy O, Wool A (2005) A Uniform Framework for Cryptanalysis of the Bluetooth E0 Cipher. 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), pp. 365–373.
Shaked Y, Wool A (2006) Cryptanalysis of the Bluetooth E0 Cipher using OBDD’s. 9th Information Security Conference, LNCS 4176: 187–202.
Dunning J (2010) Taming the Blue Beast: A survey of Bluetooth Based Threats. IEEE Security and Privacy, pp. 20–27.
Laurie A, Holtmann M, HeMrfurt M (2011) Bluetooth Hacking: The State of the Art. Retrieved from http://trifinite.org/Downloads/trifinite.presentation 22c3 berlin.pdf. Accessed 10 June, 2011.
Becker A (2011) Bluetooth Security & Hacks. Retrieved from http://gsyc.es/ ≈anto/ubicuos2/bluetooth security and hacks.pdf. Accessed 19 June, 2011.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Chen, L., Cooper, P., Liu, Q. (2013). Security in Bluetooth Networks and Communications. In: Wireless Network Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36511-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-36511-9_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36510-2
Online ISBN: 978-3-642-36511-9
eBook Packages: Computer ScienceComputer Science (R0)