Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode

  title={Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode},
  author={Johannes Barnickel and Jian Wang and Ulrike Meyer},
  journal={2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications},
Due to the serious security issues found in early Bluetooth revisions, Bluetooth revision 2.1 (and later) uses a new pairing process called Secure Simple Pairing (SSP). SSP allows two devices to establish a link key based on a Diffie-Hellman key agreement and supports four methods to authenticate the key agreement. One of these methods is called Passkey Entry method, which uses a PIN entered on one or both devices. The Passkey Entry method has been shown to leak this PIN to any attacker… CONTINUE READING
Highly Cited
This paper has 33 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 11 extracted citations

Digital Blues: An Investigation Into the Use of Bluetooth Protocols

2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) • 2018
View 4 Excerpts
Highly Influenced

Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study

2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) • 2017
View 1 Excerpt

Pebble Watch security assessment

2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT) • 2016

Dual Authentication For Bluetooth Connection

Diallo Alhassane Saliou, Wajdi F. M. Al-Khateeb, Rashidah, Funke Olanrewaju, Sado Fatai
View 1 Excerpt

Bluetooth Security Attacks

SpringerBriefs in Computer Science • 2013
View 2 Excerpts

Strong authentication on smart wireless devices

Second International Conference on Future Generation Communication Technologies (FGCT 2013) • 2013
View 1 Excerpt


Publications referenced by this paper.
Showing 1-7 of 7 references

Busting the bluetooth myth - getting raw

Max Moser
access. online, • 2007
View 3 Excerpts
Highly Influenced

Implementation of the Bluetooth stack for software defined radio, with a view to sniffing and injecting packets

Dominic Spill
Master’s thesis, • 2007
View 1 Excerpt

"Man in the Middle" Attacks on Bluetooth

Financial Cryptography • 2003
View 2 Excerpts

Similar Papers

Loading similar papers…