We implement and demonstrate a passive attack on the Bluetooth authentication protocol used to connect two devices to each other. Using a protocol analyzer and a brute-force attack on the PIN, we recover the link key shared by two devices. With this secret we can then decrypt any encrypted traffic between the devices as well as, potentially, impersonate the devices to each other. We then implement an alternative pairing protocol that is more robust against passive attacks and against active man-in-the-middle attacks. The price of the added security offered by the new protocol is its use of asymmetric cryptography, traditionally considered infeasible on handheld devices. We show that an implementation based on elliptic curves is well within the possibility of a modern handphone and has negligible effects on speed and user experience. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Wong, F. L., Stajano, F., & Clulow, J. (2007). Repairing the bluetooth pairing protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4631 LNCS, pp. 31–45). Springer Verlag. https://doi.org/10.1007/978-3-540-77156-2_4
Mendeley helps you to discover research relevant for your work.