Instead of the passive sniffing attack on pairing secrets, we show how an active fraudulent Responder can gracefully bypass passkey authentication, despite it being possibly based on even one-time generated PIN.
Category / Keywords: cryptographic protocols / Bluetooth Low Energy Authentication Date: received 22 May 2013 Contact author: tomas rosa96 at gmail com Available formats: PDF | BibTeX Citation Version: 20130525:135829 (All versions of this report) Discussion forum: Show discussion | Start new discussion