Breaking News

MediaTek announces Dimensity 9500 ASUS Announces Turbo Radeon AI Pro R9700 32GB Graphics Card GIGABYTE Launches AORUS RTX 5060 Ti AI BOX eGPU LIAN LI Launches 8.8” Universal Screen with Flexible Mounting Solution Viltrox Announces Two New Affordable, Pocketable Ultra-Wide Autofocus Prime Lenses

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Bluetooth Group Offers Security Tips

Bluetooth Group Offers Security Tips

Enterprise & IT Jun 29,2005 0

After two Israeli researchers published a paper earlier this month explaining how security mechanisms in short-range wireless Bluetooth technology could be quickly undermined, members of the Bluetooth Special Interest Group (SIG) are now urging users to take several precautions. Bluetooth, a radio technology that allows users to exchange data over the airwaves at a distance of around 10 meters, has been a target of intrusion attacks in the past.

Bluetooth security is essentially based on devices generating a secure connection through a pairing process. During this process, a user of one of the devices needs to enter a PIN code, which is used by internal algorithms to generate a secure key. This key is then used to authenticate the devices whenever they connect in the future.

But the findings of the Israeli researchers suggest the technology may be even more susceptible to attack than previously known.

The academic paper puts forward a theoretical process that could potentially "guess" the security setting on a pair of Bluetooth devices, according to the Bluetooth Web site. To do so, the attacking device needs to listen in to the initial one-time pairing process. Form this point, it can use an algorithm to guess the security key and masquerade as the other Bluetooth device.

What is new in this paper, according to the Bluetooth SIG, is an approach that forces a new pairing sequence to be conducted between the two devices and an improved method of performing the guessing process, which brings down the time significantly from previous attacks.

Even though this is an academic analysis of Bluetooth security and not a reported, real-life intrusion, SIG members, which include IBM Corp., Intel Corp., Nokia Corp., Microsoft Corp. and Motorola Inc., want to quickly eliminate any concerns users may have. On the official Bluetooth Web site (www.bluetooth.com), the group offers three basic elements of good practice to help safeguard from attack:

- When pairing devices for the first time, do so in private at home or in the office and avoid public places;

- Always use an eight character alphanumeric PIN (personal identification number) code as the minimum. The more characters within the code, the more difficult it is to crack;

- If your devices become unpaired in a public place, wait until you are in a private, secure location before re-pairing them.

Additional tips on how to use Bluetooth wireless technology securely are available at: www.bluetoothcom/help/security.asp.

Tags: Bluetooth
Previous Post
First HD-DVD ROM Media Ready by end of 2005
Next Post
Mercury and IBM Develop First Cell-Powered System

Related Posts

  • Dialog Semiconductor Adds New Features to Bluetooth SoCs to Enabling Highly Accurate Tracing

  • Bluetooth Direction Finding Feature Enables Location Services Accurate to Within 10 cm

  • Bluetooth SIG Patches Security Vulnerability

  • Bluetooth Gets Mesh Networking Capability

  • Bluetooth 5 Technology Brings Advancements In Terms Of Range, Speed And Capacity

  • Bluetooth 5 Quadruples Range, Doubles Speed, Increases Data Broadcasting Capacity

  • Bluetooth Technology to Gain Longer Range, Faster Speed

  • New Bluetooth Specifications Enable IP Connectivity, Deliver Privacy and Increased Speed

Latest News

MediaTek announces Dimensity 9500
Smartphones

MediaTek announces Dimensity 9500

ASUS Announces Turbo Radeon AI Pro R9700 32GB Graphics Card
GPUs

ASUS Announces Turbo Radeon AI Pro R9700 32GB Graphics Card

GIGABYTE Launches AORUS RTX 5060 Ti AI BOX eGPU
GPUs

GIGABYTE Launches AORUS RTX 5060 Ti AI BOX eGPU

LIAN LI Launches 8.8” Universal Screen with Flexible Mounting Solution
Enterprise & IT

LIAN LI Launches 8.8” Universal Screen with Flexible Mounting Solution

Viltrox Announces Two New Affordable, Pocketable Ultra-Wide Autofocus Prime Lenses
Cameras

Viltrox Announces Two New Affordable, Pocketable Ultra-Wide Autofocus Prime Lenses

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Noctua NH-D15 G2

Noctua NH-D15 G2

be quiet! Pure Base 501

be quiet! Pure Base 501

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed