Journal article
Key negotiation downgrade attacks on bluetooth and bluetooth low energy
- Abstract:
-
Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies specified in the Bluetooth standard. The standard includes key negotiation protocols used to generate long-term keys (during pairing) and session keys (during secure connection establishment). In this work, we demonstrate that the key negotiation protocols of Bluetooth and BLE are vulnerable to standard-compliant entropy downgrade attacks. In particular, we show how an attacker can downgrade the entropy of a...
Expand abstract
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Authors
Bibliographic Details
- Publisher:
- Association for Computing Machinery Publisher's website
- Journal:
- ACM Transactions on Privacy and Security Journal website
- Volume:
- 23
- Issue:
- 3
- Article number:
- 14
- Publication date:
- 2020-06-17
- Acceptance date:
- 2020-04-01
- DOI:
- EISSN:
-
2471-2574
- ISSN:
-
2471-2566
Item Description
- Language:
- English
- Keywords:
- Pubs id:
-
1116873
- Local pid:
- pubs:1116873
- Deposit date:
- 2020-07-07
Terms of use
- Copyright holder:
- Antonioli et al.
- Copyright date:
- 2020
- Rights statement:
- © 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM.
- Notes:
- This is the accepted manuscript version of the article. The final version is available online from the Association for Computing Machinery at: https://doi.org/10.1145/3394497
Metrics
If you are the owner of this record, you can report an update to it here: Report update to this record