Skip to Content
Smart Phone and Next Generation Mobile Computing
book

Smart Phone and Next Generation Mobile Computing

by Pei Zheng, Lionel Ni
July 2010
Intermediate to advanced
350 pages
14h 19m
English
Morgan Kaufmann
Content preview from Smart Phone and Next Generation Mobile Computing
Mobile Security and Privacy 383
6.4.2 Bluetooth Weakness and Attacks
The use of a PIN code during pairing presents some security risks [9].
The length of a PIN can be between 8 and 128 bits. It could come
with the device or can be selected by the user. Prior to link key
exchange, an initialization key will first be computed, which in
turn uses the PIN code. An attacker may make an exhaustive search
over all possible PINs up to a specific length. To verify its guess,
the attacker only needs to eavesdrop on the communication chan-
nel between two victims to capture random numbers in cleartext
and perform the initialization key algorithm. When the PIN code
is obtained, the attacker can compute the initialization key and
the link key. Eventually, the encryption ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

What Employees Want Most in Uncertain Times

What Employees Want Most in Uncertain Times

Kristine W. Powers, Jessica B.B. Diaz

Publisher Resources

ISBN: 9780120885602