首页> 外文会议>International Symposium on Computer and Information Sciences >Relay Attacks on Bluetooth Authentication and Solutions
【24h】

Relay Attacks on Bluetooth Authentication and Solutions

机译:中继攻击蓝牙身份验证和解决方案

获取原文
获取外文期刊封面目录资料

摘要

We describe relay attacks on Bluetooth authentication protocol. The aim of these attacks is impersonation. The attacker does not need to guess or obtain a common secret known to both victims in order to set up these attacks, merely to relay the information it receives from one victim to the other during the authentication protocol run. Bluetooth authentication protocol allows such a relay if the victims do not hear each other. Such a setting is highly probable. We analyze the attacks for several scenarios and propose practical solutions. Moreover, we simulate attacks to make sure about their feasibility. These simulations show that current Bluetooth specifications do not have defensive mechanisms for relay attacks. However, relay attacks create a significant partial delay during the connection that might be useful for detection.
机译:我们描述了对蓝牙认证协议的继电器攻击。这些攻击的目的是冒充的。攻击者无需猜测或获得两个受害者已知的共同秘密,以便在认证协议运行期间中继其从一个受害者从一个受害者中继的信息。蓝牙身份验证协议允许如果受害者互相听到,则允许此类继电器。这样的设置是高度可能的。我们分析了几种情况的攻击,并提出了实用的解决方案。此外,我们模拟攻击以确保其可行性。这些模拟表明,当前的蓝牙规格没有用于继电器攻击的防御机制。但是,继电器攻击在连接可能有用的连接期间会产生显着的部分延迟。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号