Breaking News

Apple unleashes M5 CPU and new devices PlayStation Plus Game Catalog for October 2025 Logitech Muse, the Digital Pencil for Apple Vision Pro, Launches October 22nd NIKON EXPANDS DX LENS LINEUP WITH TWO NEW NIKKOR LENSES MSI Unveils the AI-Ready Cubi Z AI Series Mini PC

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Bluetooth Group Offers Security Tips

Bluetooth Group Offers Security Tips

Enterprise & IT Jun 29,2005 0

After two Israeli researchers published a paper earlier this month explaining how security mechanisms in short-range wireless Bluetooth technology could be quickly undermined, members of the Bluetooth Special Interest Group (SIG) are now urging users to take several precautions. Bluetooth, a radio technology that allows users to exchange data over the airwaves at a distance of around 10 meters, has been a target of intrusion attacks in the past.

Bluetooth security is essentially based on devices generating a secure connection through a pairing process. During this process, a user of one of the devices needs to enter a PIN code, which is used by internal algorithms to generate a secure key. This key is then used to authenticate the devices whenever they connect in the future.

But the findings of the Israeli researchers suggest the technology may be even more susceptible to attack than previously known.

The academic paper puts forward a theoretical process that could potentially "guess" the security setting on a pair of Bluetooth devices, according to the Bluetooth Web site. To do so, the attacking device needs to listen in to the initial one-time pairing process. Form this point, it can use an algorithm to guess the security key and masquerade as the other Bluetooth device.

What is new in this paper, according to the Bluetooth SIG, is an approach that forces a new pairing sequence to be conducted between the two devices and an improved method of performing the guessing process, which brings down the time significantly from previous attacks.

Even though this is an academic analysis of Bluetooth security and not a reported, real-life intrusion, SIG members, which include IBM Corp., Intel Corp., Nokia Corp., Microsoft Corp. and Motorola Inc., want to quickly eliminate any concerns users may have. On the official Bluetooth Web site (www.bluetooth.com), the group offers three basic elements of good practice to help safeguard from attack:

- When pairing devices for the first time, do so in private at home or in the office and avoid public places;

- Always use an eight character alphanumeric PIN (personal identification number) code as the minimum. The more characters within the code, the more difficult it is to crack;

- If your devices become unpaired in a public place, wait until you are in a private, secure location before re-pairing them.

Additional tips on how to use Bluetooth wireless technology securely are available at: www.bluetoothcom/help/security.asp.

Tags: Bluetooth
Previous Post
First HD-DVD ROM Media Ready by end of 2005
Next Post
Mercury and IBM Develop First Cell-Powered System

Related Posts

  • Dialog Semiconductor Adds New Features to Bluetooth SoCs to Enabling Highly Accurate Tracing

  • Bluetooth Direction Finding Feature Enables Location Services Accurate to Within 10 cm

  • Bluetooth SIG Patches Security Vulnerability

  • Bluetooth Gets Mesh Networking Capability

  • Bluetooth 5 Technology Brings Advancements In Terms Of Range, Speed And Capacity

  • Bluetooth 5 Quadruples Range, Doubles Speed, Increases Data Broadcasting Capacity

  • Bluetooth Technology to Gain Longer Range, Faster Speed

  • New Bluetooth Specifications Enable IP Connectivity, Deliver Privacy and Increased Speed

Latest News

Apple unleashes M5 CPU and new devices
Enterprise & IT

Apple unleashes M5 CPU and new devices

PlayStation Plus Game Catalog for October 2025
Gaming

PlayStation Plus Game Catalog for October 2025

Logitech Muse, the Digital Pencil for Apple Vision Pro, Launches October 22nd
Consumer Electronics

Logitech Muse, the Digital Pencil for Apple Vision Pro, Launches October 22nd

NIKON EXPANDS DX LENS LINEUP WITH TWO NEW NIKKOR LENSES
Cameras

NIKON EXPANDS DX LENS LINEUP WITH TWO NEW NIKKOR LENSES

MSI Unveils the AI-Ready Cubi Z AI Series Mini PC
Enterprise & IT

MSI Unveils the AI-Ready Cubi Z AI Series Mini PC

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Pure Base 501

be quiet! Pure Base 501

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed