 |
Bluetooth® Core Specification Version 5.4: Technical Overview A technical overview of the Bluetooth Core Specification Version 5.4, detailing updates and changes including Periodic Advertising with Responses (PAwR), Encrypted Advertising Data, LE GATT Security Levels Characteristic, and Advertising Coding Selection. |
 |
Bluetooth 4.1 Quick Reference Guide A quick reference guide to the features and benefits of Bluetooth 4.1, highlighting improvements in usability, developer innovation, and its role in the Internet of Things. |
 |
Bluetooth 5.3 Core Specification Feature Enhancements This document details the feature enhancements introduced in the Bluetooth Core Specification Version 5.3, including Periodic Advertising Enhancement, Encryption Key Size Control Enhancement, Connection Subrating, and Channel Classification Enhancement. |
 |
Bluetooth Core Specification Version 5.2 Feature Overview This document summarizes and explains the three primary updates introduced in the Bluetooth Core Specification version 5.2, focusing on Enhanced Attribute Protocol (EATT), LE Power Control, and LE Isochronous Channels. |
 |
Bluetooth Core Specification v5.1 Feature Overview A summary and explanation of the changes and new features introduced in the Bluetooth Core Specification version 5.1, including Direction Finding, GATT Caching Enhancements, Randomized Advertising Channel Indexing, Periodic Advertising Sync Transfer, and various minor enhancements. |
 |
Bluetooth Security: An Overview of its Mechanisms and Vulnerabilities This document provides a comprehensive analysis of Bluetooth security, covering its architecture, security measures, and potential vulnerabilities. It details key management, encryption, authentication, and ad hoc network security aspects, highlighting areas for improvement. |
 |
Understanding Bluetooth Vulnerabilities: A Deep Dive Explore the security aspects of Bluetooth technology, including its protocols, common vulnerabilities, and attack vectors. This presentation from Hack.lu 2006 by Kevin Finistere and Thierry Zoller provides an in-depth look at Bluetooth's strengths and weaknesses. |
 |
The KNOB is Broken: Exploiting Low Entropy in Bluetooth Encryption Key Negotiation This paper details the KNOB attack, which exploits a vulnerability in the Bluetooth BR/EDR encryption key negotiation protocol to reduce encryption key entropy to 1 byte, allowing attackers to easily brute-force keys, decrypt traffic, and inject malicious data. |