Please use this identifier to cite or link to this item: https://hdl.handle.net/11499/5017
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLevi, A.-
dc.contributor.authorÇetintaş, E.-
dc.contributor.authorAydos, Murat.-
dc.contributor.authorKoç, Ç.K.-
dc.contributor.authorUfuk Çaglayan, M.-
dc.date.accessioned2019-08-16T11:40:04Z
dc.date.available2019-08-16T11:40:04Z
dc.date.issued2004-
dc.identifier.issn0302-9743-
dc.identifier.urihttps://hdl.handle.net/11499/5017-
dc.description.abstractWe describe relay attacks on Bluetooth authentication protocol. The aim of these attacks is impersonation. The attacker does not need to guess or obtain a common secret known to both victims in order to set up these attacks, merely to relay the information it receives from one victim to the other during the authentication protocol run. Bluetooth authentication protocol allows such a relay if the victims do not hear each other. Such a setting is highly probable. We analyze the attacks for several scenarios and propose practical solutions. Moreover, we simulate attacks to make sure about their feasibility. These simulations show that current Bluetooth specifications do not have defensive mechanisms for relay attacks. However, relay attacks create a significant partial delay during the connection that might be useful for detection. © Springer-Verlag 2004.en_US
dc.language.isoenen_US
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectAuthenticationen_US
dc.subjectAuthentication protocolsen_US
dc.subjectBluetooth specificationen_US
dc.subjectDefensive mechanismen_US
dc.subjectPractical solutionsen_US
dc.subjectRelay attacken_US
dc.subjectBluetoothen_US
dc.titleRelay attacks on bluetooth authentication and solutionsen_US
dc.typeArticleen_US
dc.identifier.volume3280en_US
dc.identifier.startpage278
dc.identifier.startpage278en_US
dc.identifier.endpage288en_US
dc.authorid0000-0002-7570-9204-
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.identifier.scopus2-s2.0-35048863385en_US
dc.identifier.wosWOS:000225096700029en_US
dc.identifier.scopusqualityQ2-
dc.ownerPamukkale_University-
item.fulltextNo Fulltext-
item.languageiso639-1en-
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.openairetypeArticle-
item.cerifentitytypePublications-
Appears in Collections:Mühendislik Fakültesi Koleksiyonu
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

48
checked on Dec 14, 2024

WEB OF SCIENCETM
Citations

32
checked on Dec 19, 2024

Page view(s)

18
checked on Aug 24, 2024

Google ScholarTM

Check





Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.