首页> 外文会议>Communication, Network, and Information Security >TWO PRACTICAL ATTACKS AGAINST BLUETOOTH SECURITY USING NEW ENHANCED IMPLEMENTATIONS OF SECURITY ANALYSIS TOOLS
【24h】

TWO PRACTICAL ATTACKS AGAINST BLUETOOTH SECURITY USING NEW ENHANCED IMPLEMENTATIONS OF SECURITY ANALYSIS TOOLS

机译:使用新增强的安全性分析工具实施,针对蓝牙安全性的两个实际攻击

获取原文

摘要

Bluetooth is an open specification for short range wireless ad-hoc communication. As an interconnection technology, Bluetooth has to address all the traditional security problems, well known from the distributed networks but on a new level because security issues in ad-hoc networks are much more complex than those of more traditional distributed networks. Moreover, Bluetooth networks are formed by the radio links, which means that there are also additional security aspects whose impact is yet not well understood. New, enhanced implementations of two existing Bluetooth security analysis tools and two new attacks against Bluetooth security as well as the most feasible countermeasures are presented in the paper. A laboratory environment in which these new attacks against Bluetooth security have been performed is also described.
机译:蓝牙是用于短距离无线自组织通信的开放规范。作为一种互连技术,蓝牙必须解决所有传统的安全问题,这些问题在分布式网络中广为人知,但由于自组织网络中的安全问题比更传统的分布式网络中的安全问题复杂得多,因此蓝牙技术必须在一个新的水平上解决。此外,蓝牙网络是由无线电链路形成的,这意味着还存在其他安全方面的影响,人们对其影响尚不十分了解。本文介绍了两个现有蓝牙安全性分析工具的新的增强实现,以及两个针对蓝牙安全性的新攻击以及最可行的对策。还描述了一个实验室环境,在这些环境中已经执行了针对蓝牙安全性的这些新攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号