Journal article icon

Journal article

Key negotiation downgrade attacks on bluetooth and bluetooth low energy

Abstract:

Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies specified in the Bluetooth standard. The standard includes key negotiation protocols used to generate long-term keys (during pairing) and session keys (during secure connection establishment). In this work, we demonstrate that the key negotiation protocols of Bluetooth and BLE are vulnerable to standard-compliant entropy downgrade attacks. In particular, we show how an attacker can downgrade the entropy of a...

Expand abstract
Publication status:
Published
Peer review status:
Peer reviewed

Actions


Access Document


Files:
Publisher copy:
10.1145/3394497

Authors


More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Oxford college:
Kellogg College
Role:
Author
ORCID:
0000-0002-9471-9985
Publisher:
Association for Computing Machinery Publisher's website
Journal:
ACM Transactions on Privacy and Security Journal website
Volume:
23
Issue:
3
Article number:
14
Publication date:
2020-06-17
Acceptance date:
2020-04-01
DOI:
EISSN:
2471-2574
ISSN:
2471-2566
Language:
English
Keywords:
Pubs id:
1116873
Local pid:
pubs:1116873
Deposit date:
2020-07-07

Terms of use


Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP