Please use this identifier to cite or link to this item:
https://hdl.handle.net/11499/5017
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Levi, A. | - |
dc.contributor.author | Çetintaş, E. | - |
dc.contributor.author | Aydos, Murat. | - |
dc.contributor.author | Koç, Ç.K. | - |
dc.contributor.author | Ufuk Çaglayan, M. | - |
dc.date.accessioned | 2019-08-16T11:40:04Z | |
dc.date.available | 2019-08-16T11:40:04Z | |
dc.date.issued | 2004 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://hdl.handle.net/11499/5017 | - |
dc.description.abstract | We describe relay attacks on Bluetooth authentication protocol. The aim of these attacks is impersonation. The attacker does not need to guess or obtain a common secret known to both victims in order to set up these attacks, merely to relay the information it receives from one victim to the other during the authentication protocol run. Bluetooth authentication protocol allows such a relay if the victims do not hear each other. Such a setting is highly probable. We analyze the attacks for several scenarios and propose practical solutions. Moreover, we simulate attacks to make sure about their feasibility. These simulations show that current Bluetooth specifications do not have defensive mechanisms for relay attacks. However, relay attacks create a significant partial delay during the connection that might be useful for detection. © Springer-Verlag 2004. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Authentication | en_US |
dc.subject | Authentication protocols | en_US |
dc.subject | Bluetooth specification | en_US |
dc.subject | Defensive mechanism | en_US |
dc.subject | Practical solutions | en_US |
dc.subject | Relay attack | en_US |
dc.subject | Bluetooth | en_US |
dc.title | Relay attacks on bluetooth authentication and solutions | en_US |
dc.type | Article | en_US |
dc.identifier.volume | 3280 | en_US |
dc.identifier.startpage | 278 | |
dc.identifier.startpage | 278 | en_US |
dc.identifier.endpage | 288 | en_US |
dc.authorid | 0000-0002-7570-9204 | - |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopus | 2-s2.0-35048863385 | en_US |
dc.identifier.wos | WOS:000225096700029 | en_US |
dc.identifier.scopusquality | Q2 | - |
dc.owner | Pamukkale_University | - |
item.fulltext | No Fulltext | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.openairetype | Article | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | Mühendislik Fakültesi Koleksiyonu Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
48
checked on Dec 14, 2024
WEB OF SCIENCETM
Citations
32
checked on Dec 19, 2024
Page view(s)
18
checked on Aug 24, 2024
Google ScholarTM
Check
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.