Skip to main content

Man-in-the-Middle Attack and Its Countermeasure in Bluetooth Secure Simple Pairing

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 157))

Abstract

This paper describes the countermeasure of man-in-the-mid-dle attack in Bluetooth secure simple pairing. The attack is based on sending random signals to jam the physical layer of legitimate user and then by falsification of information sent during the input/output capabilities exchange; also the fact that the security of the protocol is likely to be limited by the capabilities of the least powerful or the least secure device type. In addition, a new countermeasure is devised that render the attack impractical, as well as it is an improvement to the existing Bluetooth secure simple pairing in order to make it more secure.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Haataja, K., Toivanen, P.: Two Practical Man-in-the-Middle Attacks on Bluetooth Secure Simple Pairing and Countermeasures. IEEE Transactions on Wireless Communications 9(1), 384–392 (2010), http://dx.doi.org/10.1109/TWC.2010.01.090935

    Article  Google Scholar 

  2. Jakobsson, M., Wetzel, S.: Security Weaknesses in Bluetooth. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 176–191. Springer, Heidelberg (2001), http://dx.doi.org/10.1007/3-540-45353-9_14

    Chapter  Google Scholar 

  3. Kugler, D.: Man in the middle attacks on bluetooth. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 149–161. Springer, Heidelberg (2003), http://dx.doi.org/10.1007/978-3-540-45126-6_11

    Chapter  Google Scholar 

  4. Levi, A., Çetintaş, E., Aydos, M., Koç, c.K., Çağlayan, M.U.: Relay Attacks on Bluetooth Authentication and Solutions. In: Aykanat, C., Dayar, T., Körpeoğlu, İ. (eds.) ISCIS 2004. LNCS, vol. 3280, pp. 278–288. Springer, Heidelberg (2004), http://dx.doi.org/10.1007/978-3-540-30182-0_29

    Chapter  Google Scholar 

  5. Haataja, K.: Security Threats and Countermeasures in Bluetooth-Enabled Systems. Ph.D. thesis, University of Kuopio, Department of Computer Science (February 2009)

    Google Scholar 

  6. Suomalainen, J., Valkonen, J., Asokan, N.: Security associations in personal networks: A comparative analysis. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 43–57. Springer, Heidelberg (2007), http://dx.doi.org/10.1007/978-3-540-73275-4_4

    Chapter  Google Scholar 

  7. Hypponen, K., Haataja, K.: Nino: Man-in-the-Middle Attack on Bluetooth Secure Simple Pairing. In: 3rd IEEE/IFIP International Conference in Central Asia on Internet, ICI 2007, pp. 1–5 (September 2007), http://dx.doi.org/10.1109/CANET.2007.4401672

  8. Haataja, K., Hypponen, K.: Man-in-the-Middle Attacks on Bluetooth: A Comparative Analysis, A Novel Attack, and Countermeasures. In: Proc. IEEE Third International Symposium on Communications, Control and Signal Processing (ISCCSP 2008), St. Julians, Malta (March 2008)

    Google Scholar 

  9. Haataja, K., Toivanen, P.: Practical Man-in-the-Middle Attacks Against Bluetooth Secure Simple Pairing. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, pp. 1–5 (October 2008), http://dx.doi.org/10.1109/WiCom.2008.1153

  10. Pelechrinis, K., Iliofotou, M., Krishnamurthy, V.: Denial of Service Attacks in Wireless Networks: The case of Jammers. IEEE Communications Surveys Tutorials 99, 1–13 (2010), http://dx.doi.org/10.1109/SURV.2011.041110.00022

    Google Scholar 

  11. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proceedings of the 6th ACM international symposium on Mobile Ad Hoc Networking and Computing MobiHoc 2005, pp. 46–57. ACM, New York (2005), http://doi.acm.org/10.1145/1062689.1062697

    Google Scholar 

  12. Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming Sensor Networks: Attack and Defense Strategies. IEEE Network 20(3), 41–47 (2006), http://dx.doi.org/10.1109/MNET.2006.1637931

    Article  Google Scholar 

  13. Noubir, G.: On connectivity in ad hoc networks under jamming using directional antennas and mobility. In: Langendoerfer, P., Liu, M., Matta, I., Tsaoussidis, V. (eds.) WWIC 2004. LNCS, vol. 2957, pp. 186–200. Springer, Heidelberg (2004), http://dx.doi.org/10.1007/978-3-540-24643-5_17

    Chapter  Google Scholar 

  14. Viterbi, A.J.: Principles of Spread Spectrum Communication. Addison-Wesley Wireless Communications Series. Addison-Wesley, Reading (1995)

    MATH  Google Scholar 

  15. Noubir, G., Lin, G.: Low-Power Dos Attacks in Data Wireless Lans and Countermeasures. SIGMOBILE Mob. Comput. Commun. Rev. 7, 29–30 (2003), http://doi.acm.org/10.1145/961268.961277

    Article  Google Scholar 

  16. Lin, G., Noubir, G.: On Link Layer Denial of Service in Data Wireless Lans: Research Articles. Wirel. Commun. Mob. Comput. 5, 273–284 (2005), http://portal.acm.org/citation.cfm?id=1072503.1072505

    Article  Google Scholar 

  17. Xu, W., Trappe, W., Zhang, Y.: Anti-Jamming Timing Channels for Wireless Networks. In: Proceedings of the first ACM conference on Wireless network security, WiSec 2008, pp. 203–213. ACM, New York (2008), http://doi.acm.org/10.1145/1352533.1352567

    Google Scholar 

  18. Chung, F., Salehi, J., Wei, V.: Optical Orthogonal Codes: Design, Analysis and Applications. IEEE Transactions on Information Theory 35(3), 595–604 (1989), http://dx.doi.org/10.1109/18.30982

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mutchukota, T.R., Panigrahy, S.K., Jena, S.K. (2011). Man-in-the-Middle Attack and Its Countermeasure in Bluetooth Secure Simple Pairing. In: Venugopal, K.R., Patnaik, L.M. (eds) Computer Networks and Intelligent Computing. ICIP 2011. Communications in Computer and Information Science, vol 157. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22786-8_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22786-8_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22785-1

  • Online ISBN: 978-3-642-22786-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics