Abstract
This paper describes the countermeasure of man-in-the-mid-dle attack in Bluetooth secure simple pairing. The attack is based on sending random signals to jam the physical layer of legitimate user and then by falsification of information sent during the input/output capabilities exchange; also the fact that the security of the protocol is likely to be limited by the capabilities of the least powerful or the least secure device type. In addition, a new countermeasure is devised that render the attack impractical, as well as it is an improvement to the existing Bluetooth secure simple pairing in order to make it more secure.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Haataja, K., Toivanen, P.: Two Practical Man-in-the-Middle Attacks on Bluetooth Secure Simple Pairing and Countermeasures. IEEE Transactions on Wireless Communications 9(1), 384–392 (2010), http://dx.doi.org/10.1109/TWC.2010.01.090935
Jakobsson, M., Wetzel, S.: Security Weaknesses in Bluetooth. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 176–191. Springer, Heidelberg (2001), http://dx.doi.org/10.1007/3-540-45353-9_14
Kugler, D.: Man in the middle attacks on bluetooth. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 149–161. Springer, Heidelberg (2003), http://dx.doi.org/10.1007/978-3-540-45126-6_11
Levi, A., Çetintaş, E., Aydos, M., Koç, c.K., Çağlayan, M.U.: Relay Attacks on Bluetooth Authentication and Solutions. In: Aykanat, C., Dayar, T., Körpeoğlu, İ. (eds.) ISCIS 2004. LNCS, vol. 3280, pp. 278–288. Springer, Heidelberg (2004), http://dx.doi.org/10.1007/978-3-540-30182-0_29
Haataja, K.: Security Threats and Countermeasures in Bluetooth-Enabled Systems. Ph.D. thesis, University of Kuopio, Department of Computer Science (February 2009)
Suomalainen, J., Valkonen, J., Asokan, N.: Security associations in personal networks: A comparative analysis. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 43–57. Springer, Heidelberg (2007), http://dx.doi.org/10.1007/978-3-540-73275-4_4
Hypponen, K., Haataja, K.: Nino: Man-in-the-Middle Attack on Bluetooth Secure Simple Pairing. In: 3rd IEEE/IFIP International Conference in Central Asia on Internet, ICI 2007, pp. 1–5 (September 2007), http://dx.doi.org/10.1109/CANET.2007.4401672
Haataja, K., Hypponen, K.: Man-in-the-Middle Attacks on Bluetooth: A Comparative Analysis, A Novel Attack, and Countermeasures. In: Proc. IEEE Third International Symposium on Communications, Control and Signal Processing (ISCCSP 2008), St. Julians, Malta (March 2008)
Haataja, K., Toivanen, P.: Practical Man-in-the-Middle Attacks Against Bluetooth Secure Simple Pairing. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, pp. 1–5 (October 2008), http://dx.doi.org/10.1109/WiCom.2008.1153
Pelechrinis, K., Iliofotou, M., Krishnamurthy, V.: Denial of Service Attacks in Wireless Networks: The case of Jammers. IEEE Communications Surveys Tutorials 99, 1–13 (2010), http://dx.doi.org/10.1109/SURV.2011.041110.00022
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proceedings of the 6th ACM international symposium on Mobile Ad Hoc Networking and Computing MobiHoc 2005, pp. 46–57. ACM, New York (2005), http://doi.acm.org/10.1145/1062689.1062697
Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming Sensor Networks: Attack and Defense Strategies. IEEE Network 20(3), 41–47 (2006), http://dx.doi.org/10.1109/MNET.2006.1637931
Noubir, G.: On connectivity in ad hoc networks under jamming using directional antennas and mobility. In: Langendoerfer, P., Liu, M., Matta, I., Tsaoussidis, V. (eds.) WWIC 2004. LNCS, vol. 2957, pp. 186–200. Springer, Heidelberg (2004), http://dx.doi.org/10.1007/978-3-540-24643-5_17
Viterbi, A.J.: Principles of Spread Spectrum Communication. Addison-Wesley Wireless Communications Series. Addison-Wesley, Reading (1995)
Noubir, G., Lin, G.: Low-Power Dos Attacks in Data Wireless Lans and Countermeasures. SIGMOBILE Mob. Comput. Commun. Rev. 7, 29–30 (2003), http://doi.acm.org/10.1145/961268.961277
Lin, G., Noubir, G.: On Link Layer Denial of Service in Data Wireless Lans: Research Articles. Wirel. Commun. Mob. Comput. 5, 273–284 (2005), http://portal.acm.org/citation.cfm?id=1072503.1072505
Xu, W., Trappe, W., Zhang, Y.: Anti-Jamming Timing Channels for Wireless Networks. In: Proceedings of the first ACM conference on Wireless network security, WiSec 2008, pp. 203–213. ACM, New York (2008), http://doi.acm.org/10.1145/1352533.1352567
Chung, F., Salehi, J., Wei, V.: Optical Orthogonal Codes: Design, Analysis and Applications. IEEE Transactions on Information Theory 35(3), 595–604 (1989), http://dx.doi.org/10.1109/18.30982
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mutchukota, T.R., Panigrahy, S.K., Jena, S.K. (2011). Man-in-the-Middle Attack and Its Countermeasure in Bluetooth Secure Simple Pairing. In: Venugopal, K.R., Patnaik, L.M. (eds) Computer Networks and Intelligent Computing. ICIP 2011. Communications in Computer and Information Science, vol 157. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22786-8_46
Download citation
DOI: https://doi.org/10.1007/978-3-642-22786-8_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22785-1
Online ISBN: 978-3-642-22786-8
eBook Packages: Computer ScienceComputer Science (R0)