【24h】

Relay Attacks on Bluetooth Authentication and Solutions

机译:蓝牙身份验证和解决方案的中继攻击

获取原文
获取原文并翻译 | 示例

摘要

We describe relay attacks on Bluetooth authentication protocol. The aim of these attacks is impersonation. The attacker does not need to guess or obtain a common secret known to both victims in order to set up these attacks, merely to relay the information it receives from one victim to the other during the authentication protocol run. Bluetooth authentication protocol allows such a relay if the victims do not hear each other. Such a setting is highly probable. We analyze the attacks for several scenarios and propose practical solutions. Moreover, we simulate attacks to make sure about their feasibility. These simulations show that current Bluetooth specifications do not have defensive mechanisms for relay attacks. However, relay attacks create a significant partial delay during the connection that might be useful for detection.
机译:我们描述了对蓝牙认证协议的中继攻击。这些攻击的目的是冒充他人。攻击者无需猜测或获取两个受害者都知道的公共秘密即可发起这些攻击,仅在身份验证协议运行期间将其从一个受害者接收的信息中继到另一个受害者即可。如果受害者之间没有听到对方的声音,则蓝牙验证协议可以进行这种中继。这样的设置很有可能。我们分析了几种情况下的攻击并提出了切实可行的解决方案。此外,我们模拟攻击以确保其可行性。这些模拟表明,当前的蓝牙规范没有针对中继攻击的防御机制。但是,中继攻击会在连接期间造成明显的部分延迟,这可能对检测很有用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号