Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Bluetooth Security.pdf
Скачиваний:
105
Добавлен:
17.08.2013
Размер:
1.57 Mб
Скачать

164

Bluetooth Security

the standard Bluetooth pairing, which is not the case for the PCD-based approach.

References

[1]Kügler, D., “Man in the Middle Attacks on Bluetooth,” revised papers, in R. N. Wright, ed., Financial Cryptography, 7th International Conf., FC 2003, Guadeloup, No. 2742 in LNCS, Springer-Verlag, 2003, pp. 149–61.

[2]Jakobsson, M., and S. Wetzel, “Security Weaknesses in Bluetooth,” in D. Naccache, (ed.), Proc. RSA Conf. 2001, No. 2020 in LNCS, San Francisco: Springer-Verlag, April 8–12, 2001.

[3]Diffie, W., and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. Information Theory, Vol. 22, 1976, pp. 644–654.

[4]Shamir, A., R. L. Rivest, and L. Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,” Comm. ACM, Vol. 21, 1978, pp. 294–299.

[5]Stajano, F., and R. Anderson, “The Resurrecting Duckling: Security Issues for ad-hoc Wireless Networks,” Security Protocols, 7th International Workshop, No. 1796 in LNCS, Cambridge: Springer-Verlag, April 1999.

[6]Maher, D., “Secure Communication Method and Apparatus,” U.S. Patent No. 5,450,492, 1995.

[7]Sovio, S., et al. “D13, Annex 2, Specification of a Security Architecture for Distributed Terminals,” Report IST-2000-25250, IST project SHAMAN, 2002.

[8]Larsson, J.-O., “Higher Layer Key Exchange Techniques for Bluetooth Security,” Open Group Conf., Amsterdam, October 24, 2001.

[9]van Oorschot, P. C., A. J. Menezes, and S. A. Vanstone, Handbook of Applied Cryptography, Boca Raton, FL: CRC Press, 1997.

[10]Jain, S. K., P. B. Bhattacharya, and S. R. Nagpaul, Basic Abstract Algebra, Cambridge: Cambridge University Press, 1986.

[11]NIST, FIPS 180-1, Secure Hash Standard, National Technical Information Service, Springfield, VA, April 1995.

[12]Simmons, G. J., “A Survey of Information Authentication,” in G. J. Simmons, (ed.), Contemporary Cryptology, The Science of Information Integrity, New York: IEEE Press, 1992, pp. 379–420.

[13]Reed, I. S., and G. Solomon, “Polynomial Codes over Certain Finite Fields,” J. Society for Industrial and Applied Mathematics, Vol. 8, 1960, pp. 300–304.

[14]Menezes, A. J., Elliptic Curve Public Key Cryptosystems, Dordrecht: Kluwer, 1993.

[15]Bluetooth Special Interest Group, Specification of the Bluetooth System, Version 1.1, Profiles, Part K:1O Object Exchange Profile, February 2001.

Key Management Extensions

165

 

 

[16]Bluetooth Special Interest Group, Specification of the Bluetooth System, Version 1.0, Personal Area Networking Profile, February 2003.

[17]Bunk, L., and J. Vollbrecht, PPP Extensible Authentication Protocol (EAP), RFC 2284, March 1998.

[18]IEEE, IEEE Std., 802.1x-2001, Version 2001, Port-Based Network Access Control, June 2001.

[19]IEEE, Standard Specifications for Public Key Cryptography, IEEE Std. 1353-2000, 2000.

[20]ANSI, Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography, ANSI X.9.63, 2001, 2001.

[21]Blake-Wilson, S., “Higher Layer Key Exchange in Bluetooth,” manuscript, private communication, 2001.

[22]Bluetooth Special Interest Group, Specification of the Bluetooth System, Version 1.0, Bluetooth Network Encapsulation Protocol (BNEP) Specification, February 2003.

[23]Kohl, J., and C. Neuman, The Kerberos Network Authentication Service (V5), RFC 1510, September 1993.

[24]Aboba, B., and D. Simon, PPP EAP TLS Authentication Protocol, RFC 2716, October 1999.

[25]Dierks, T., and C. Allen, The TLS Protocol, Version 1.0, RFC 2246, January 1999.

[26]Kent, S., and R. Atkinson, IP Encapsulating Security Payload (ESP), RFC 1827, November 1998.

[27]Kent, S., and R. Atkinson, IP Authentication Header, RFC 2402, November 1998.

[28]Gehrmann, C., and K. Nyberg, “Security in Personal Area Networks,” in Security for Mobility, Herts: IEE, 2004.

[29]Mitchell, C., et al, “D13, Annex 3, wp3—Final Technical Report,” Report IST-2000-25250, IST project SHAMAN, 2002.

[30]Mitchell, C., and R. Schaffelhofer, “The Personal PKI,” in Security for Mobility, Herts: IEE, 2004.

[31]“Information Technology—Open System Interconnection—The Directory: Authentication Framework,” ISO/IEC 9594-8, 1995.

[32]RSA Data Security Inc., Redwood City, CA, PKCS #10: Certification Request Syntax Standard, v1.7, 2000.