New efficient intrusion detection and prevention system for Bluetooth networks

In this paper, we investigate how various Bluetooth security attacks in progress can be prevented and stopped by monitoring communication for discovery of such attacks. Moreover, we propose an idea of the new efficient Intrusion Detection and Prevention System for Bluetooth networks to prevent attacks in progress. Proposed system is based on the set of rules that are used to identify strange communication behaviour of Bluetooth devices.

[1]  K. Hypponen,et al.  “Nino” man-in-the-middle attack on bluetooth secure simple pairing , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.

[2]  Andrea Bittau,et al.  BlueSniff: Eve Meets Alice and Bluetooth , 2007, WOOT.

[3]  Dennis Kügler,et al.  "Man in the Middle" Attacks on Bluetooth , 2003, Financial Cryptography.

[4]  M. Ufuk Çaglayan,et al.  Relay Attacks on Bluetooth Authentication and Solutions , 2004, ISCIS.

[5]  Robert Morrow Bluetooth: Operation and Use , 2002 .

[6]  Avishai Wool,et al.  Cracking the Bluetooth PIN , 2005, MobiSys '05.

[7]  Markus Jakobsson,et al.  Security Weaknesses in Bluetooth , 2001, CT-RSA.