NUST Institutional Repository

Bluetooth Pairing Vulnerabilities & Suggestive Measures

Show simple item record

dc.contributor.author Haleem, Fahad
dc.contributor.author Supervised by Dr Mehreen Afzal.
dc.date.accessioned 2020-10-27T08:56:06Z
dc.date.available 2020-10-27T08:56:06Z
dc.date.issued 2019-10
dc.identifier.other TIS-290
dc.identifier.other MSIS-16
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/5923
dc.description.abstract The most widely and cheap mode of transmission over short distances is by using Bluetooth device. Bluetooth is most common mode to transmission between mobile phones. To make data secure for both sides of transmission, it uses key exchange algorithm named Elliptic Curve Diffie-Hellman algorithm for short term and long term key development. During the design phase of Bluetooth device, its security was not focused, hence it was vulnerable from hacker’s point of view. In the era where information is the most powerful tool, any eavesdropping may lead to the bigger threat. Bluetooth devices lack key feature authentication and is thus vulnerable to Main in the Middle (MITM) attacks. In this dissertation, we analyzed the vulnerability present in Bluetooth v 4.0 and above from both exploitation and encounter methods. The new variant of invalid curve attack that preserve only x-coordinate of public keys is recently presented, this new attack is successful against all present Bluetooth paring devices protocols. Thus both of the pairing devices are vulnerable to this attack. This thesis also includes the suggestive measures against this vulnerability that can be considered as key exchange features for the development of upcoming Bluetooth v 5.0. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Bluetooth Pairing Vulnerabilities & Suggestive Measures en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account