Keijo Haataja

Learn More
We propose two new Man-In-The-Middle (MITM) attacks on Bluetooth Secure Simple Pairing (SSP). The attacks are based on the falsification of information sent during the input/output capabilities exchange and also the fact that the security of the protocol is likely to be limited by the capabilities of the least powerful or the least secure device type. In(More)
Bluetooth is a technology for short range wireless data and realtime two-way voice transfer providing data rates up to 3 Mb/s. It can be used to connect almost any device to another device. Bluetooth-enabled devices, such as mobile phones, headsets, PCs, laptops, printers, mice, and keyboards, are widely used all over the world. Already in 2006, the one(More)
In this paper, two practical attacks against ZigBee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on sabotaging the ZigBee End-Device by sending a special(More)
In this paper, three practical attacks against ZigBee security are carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on discovering all ZigBee-enabled networks within range as well as the configurations of the(More)
In this paper, we propose a new efficient RF fingerprint-based security solution for Bluetooth Secure Simple Pairing (SSP). The proposed system is designed to be user-friendly, economical and reliable solution for securing Bluetooth networks. The purpose of this paper is to help Bluetooth device manufacturers to implement efficient Bluetooth intrusion(More)
In this paper, we evaluate the features and limitations of Tiny OS mote Simulator (TOSSIM), the sensor network simulator in TinyOS systems. The focus is on the applicability of TOSSIM for intelligent home research. As a part of the research work, we designed and implemented a simple sensor network that can be used in a virtual intelligent home. Our(More)
This report describes the details of two new proof-of-concept Bluetooth security analysis tools and two new attacks against Bluetooth security. On-Line PIN Cracking script is a security analysis tool for on-line Bluetooth device PIN cracking. Brute-Force BD ADDR Scanning script is a security analysis tool for brute-force discovery of the addresses of(More)