Bluetooth Security

16 Novembro 2015, 12:00 Miguel Filipe Leitão Pardal

Bluetooth protocol phases: initialization, link key generation, authentication and encryption key stream generation.

Bluetooth vulnerabilities: E0 algorithm, PIN, traceability, forced discovery.

Improvements to the security of Bluetooth since version 2.0: Secure and Simple Pairing modes.