“I don’t have to be careful, I’ve got a gun.”

Slides:



Advertisements
Similar presentations
Bluetooth.
Advertisements

BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Sattam Al-Sahli – Emad Al-Hemyari –
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Mohamed Mokdad Ecole d’Ingénieurs de Bienne
Bluetooth Still Waiting for the Tsunami!. Bluetooth History Ericsson initiative Special Industry Group: (Promoters) Ericsson, IBM, Intel, Nokia, and Toshiba.
By Abdullah M. Dalloul… Abdullah M. Dalloul… Salman Y. Mansour Salman Y. Mansour Supervisor. Supervisor. Dr.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
BLUETOOTH.
A Comparison of Bluetooth and competing technologies
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Bluetooth Introduction The Bluetooth Technology
By: Trevor Parker, Minh-Tri Le. Bluetooth is a wireless technology that is a low-cost, low-power, short-range radio for ad-hoc wireless communication,
Distributed systems – Part 2  Bluetooth – 2 nd set of slides Anila Mjeda.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Bluetooth & WPAN. 2 Bluetooth/WPAN WPAN (Wireless Personal Area Network) has a smaller area of coverage, say, 2.5 mW transmitter power, distance
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
EE625 Research Presentation By Ryan Dillon September, 2014.
By Santosh Sam Koshy. Agenda Need for Bluetooth Brief History of Bluetooth Introduction to Bluetooth Bluetooth System Specifications Commercial Bluetooth.
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
University of Virginia 1 Gregory LammGerlando Falauto Jorge EstradaJag Gadiyaram November 29, 2000 Identifying and Assessing Security Issues related to.
Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
Wireless Networks Instructor: Fatima Naseem Computer Engineering Department, University of Engineering and Technology, Taxila.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
BLUETOOTH WIRELESS TECHNOLOGY
An Analysis of Bluetooth Security Team A: Padmaja Sriraman Padmapriya Gudipati Sreenivasulu Lekkala.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Overview of the security weaknesses in Bluetooth Dave Singelée COSIC seminar 11/06/2003.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
Sonal Jain, IT-BHU Bluetooth Mobile Ad Hoc Networks Sonal Jain B.Tech (IV), Electrical Engg. Dept.,ITBHU IEEE SPAVes Sept 14, 15 Institute.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
BLUETOOTH HACKING - Image the world without wireless By Indra Divya.K Kalasalingam University CSE-Final yr.
Presented by Khaled Al Otaishan
Bluetooth Technology Name- Bittu Kumar Roll No.- A05 Section- E2801
SSN College of Engineering
Introduction Wireless devices offering IP connectivity
Instructor Materials Chapter 6 Building a Home Network
Physical layer protocol bluetooth
Wireless Technologies
BLUETOOTH THE STANDARD & ISSUES.
Channel Control Interim substates for adding new slaves
BLUETOOTH TECHNOLOGY/SECURITY
A Wireless LAN technologies IEEE
BLUETOOTH TECHNOLOGY/SECURITY
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
11/11/2018 Bluetooth: The Universal Radio Interface for Ad hoc, Short-Range Connectivity CIS 642 Maria Adamou.
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
BLUETOOTH AND ITS APPLICATION IN MOBILE PHONES
Bluetooth: Tutorial & Simulation
Bluetooth.
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
Bluetooth, RFID, Data Link Layer Switching
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Short-Range Radio Frequency Networking
Short-Range Radio Frequency Networking
Topic- Bluetooth Architecture
Mobile and Wireless Network Security
Security in Wide Area Networks
Security in Wireless Metropolitan Area Networks (802.16)
Security in Wireless Metropolitan Area Networks (802.16)
Presentation transcript:

“I don’t have to be careful, I’ve got a gun.” security Bluetooth Lauri Mikkola “I don’t have to be careful, I’ve got a gun.” -Homer Simpson

About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG), formed in may 1998 Founding members were Ericsson, Nokia, Intel, IBM and Toshiba Bluetooth connects different wireless devises, like laptops, mobile phones, PDAs, refrigerators etc. Bluetooth is intended to distances about 10 meters (piconet) 13.11.2018

Bluetooth details Utilizes the 2.45Ghz ISM-band Uses fast frequency-hopping spread spectrum (FHSS) technique between 79 frequencies 1600/s Can give bit rates up to 1 Mbps Piconet consist of max 8 nodes Low cost ( ~5€ ) and small size 13.11.2018

Bluetooth components Radio unit Baseband unit TDD and FHSS Baseband unit Voice to data conversion, packet segmentation, master/slave communication, identification of parties, control authorization Link Management Protocol (LMP) Set up connections and implement security features like key exchanges and encryption Logical Link Control and Adaptation Protocol (L2CAP) Multiplexing, packer segmentation/reassemly, QoS Service Discovery Protocol (SDP) Queries a Bluetooth devise and checks what services it supports 13.11.2018

Bluetooth protocol Architecture 13.11.2018

Bluetooth security features The Bluetooth specification include security features at the link level Supports authorization, authentication and encryption Based on a secret link key that is shared by a pair of devices Link key generated by a pairing procedure when two devices communicate for the first time 13.11.2018

Security modes of Bluetooth(1) No security, for testing only. Allows other Bluetooth devices initiate connections with it, PUSH messages Security mode 2 A device does not initiate security procedures before establishment of the link between the devices at the L2CAP level. Trusted and untrusted devices Security polices can flexible impose different trust levels: authentication, authorisation and encyrption 13.11.2018

Security modes of Bluetooth (2) Security at the Baseband level Security manager imposes security policies LMP makes encryption and key exchanges 13.11.2018

Key Management (1) Link keys All keys are 128bit random numbers and are either temporary or semi-permanent Unit key KA , unique long-term private key of a device Combination key KAB derived from units A and B. Generated for each pair of devices Master key Kmaster ,used when master device wants to transmit to several devices at once Initialization key Kinit ,used in the initialization process. 13.11.2018

Key Management (2) Encryption key PIN Code Derived from the current link key. Each time encryption is needed the encryption key will be automatically changed Separated from authentication key PIN Code Fixed or selected by the user Usually 4 digits, can be 8 to 128 bits Shared secret 13.11.2018

Establishment of Initialization Key (Pairing) 13.11.2018

Verification of Initialization Key (Pairing) 13.11.2018

Establishment of Link Key (1) (Pairing) Link key of devices A and B = unit key KA of device A 13.11.2018

Establishment of Link Key (2) (Pairing) Link key of devices A and B = combination key KAB 13.11.2018

Authentication and Encryption Authentication by issuing a challenge to another device The other device replies to challenge with a message based on the challenge, the Device address and the shared link key. The device that issued the challenge verifies the response and authenticates if the response is equals to it’s own calculations. Encryption is based on the 4 LFSR algorithm 13.11.2018

Bluetooth security weaknesses (1) Unlike in 802.11b WLAN, the security algorithms of Bluetooth are considered strong. However there are some attack possibilities PIN weakness Initial authentication is based on a PIN that can be anywhere between 8-128 bits. If poorly chosen can be easy to guess Impersonation A hacker can scan the MIN and ESN and pretend to be someone else Stealing the Unit Key Only the device is authenticated, not the user Replay attacks A hacker can record Bluetooth transmissions in all 79 frequencies and then in some way figure out frequency hopping sequence and then replay the whole transmission. 13.11.2018

Bluetooth security weaknesses (2) Man in the middle Bluetooth authentication is not based on public key certificates. It is possible to play man in the middle Location attack A Bluetooth device has (globally) a unique identification number, therefore it is possible to identify and locate users position Denial-of-Service attack Jamming the whole ISM band, takes lot of energy Put so many Bluetooth devices that the band is consumed Try to connect, authentication fails, but a legal client will not get through either 13.11.2018

How to avoid being attacked Paring is the most critical moment of a attack Paring should be performed in a most secure place Long PIN numbers are strongly encouraged Avoid using unit keys. Use combination keys To check default settings of device Chose to respond only to inquiries of known devices Do not save PIN permanently in memory 13.11.2018

For the paranoid MobileCloak Cloaktec Shied (fabric) Nylon Shell Blocks 10Mhz to 20Ghz signal Nylon Shell Lightweight Only $34 www.mobliecloak.com mCloak r5TM for Bluetooth 13.11.2018