Practical Bluetooth Traffic Sniffing: Systems and Privacy Implications

Slides:



Advertisements
Similar presentations
Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
Advertisements

SoNIC: Classifying Interference in Sensor Networks Frederik Hermans et al. Uppsala University, Sweden IPSN 2013 Presenter: Jeffrey.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 03. Spread Spectrum Technologies.
Jun Huang 1,  Guoliang Xing 1,  Gang Zhou 2, Ruogu Zhou 1  
InterSystem Electromagnetic Compatibility. Evolution of communication systems.
Implementation and Evaluation of a Performance Enhancing Proxy for Wireless TCP Scenarios and Architecture.
Minimum Spanning Network: Brute Force Solution
Doc.:IEEE /1159r1 Submission Laurent Cariou Sept, 2010 Slide 1 Non contiguous additional bandwidth mode Date:
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
Jin-Shyan Lee, Yu-Wei Su, and Chung-Chou Shen
Comparative Use of Unlicensed Spectrum Training materials for wireless trainers.
The Electromagnetic Spectrum The electromagnetic spectrum and its uses for communication.
Security Evaluation of Pattern Classifiers under Attack.
A Fast-Hopping Single-PLL 3-Band MB-OFDM UWB Synthesizer Remco C. H. van de Beek, Member, IEEE, Domine M. W. Leenaerts, Fellow, IEEE, and Gerard van der.
Communication Research Labs Sweden AB Introduction to Wireless communication and WLAN.
Bluetooth Address or Name Sharing By Joseph Charboneau.
Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.
24-July-2007 Wireless Networks. Wireless Technologies Bluetooth, ZigBee & Wireless USB short range communication between devices typically controlled.
Performing a Site Survey. Wireless Site Survey RF Frequencies (Licensed & Unlicensed) What market each RF Frequency serves? Types of Spectrum Analyzers.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Cognitive Radio Networks
Ethical Hacking of Wireless Routers Faizan Zahid CS-340 Nida Noor CS-378.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Dynamic Spectrum Access in the Time Domain: Modeling and Exploiting White Space Stefan Geirhofer and Lang Tong, Cornell University Brian M. Sadler, United.
1 Exploiting Diversity in Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign Presentation at Mesh.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
Doc.: IEEE /138r0 Submission March 2002 Steve Shellhammer, Symbol TechnologiesSlide 1 Steve Shellhammer, Nada Golmie, Robert Van Dyck, Jie Liang,
A presentation On a,b,g Wireless LAN, and Preented By Md.Masum Hossain Pranjal Sinha Md.Munis Varun Jain Anmol Jain Nsumbu Noe.
Networking Devices.
How Bad Are The Rogues’ Impact on Enterprise Network Performance ? Kaixin Sui, Dan Pei, Youjian Zhao, Zimu Li Tsinghua University.
Overview of the security weaknesses in Bluetooth Dave Singelée COSIC seminar 11/06/2003.
Doc.: IEEE /288 Submission July 2002 Intel Research and Development Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /0127r0 Submission January 2009 John R. Barr, Motorola, Inc.Slide 1 Bluetooth AFH and IEEE Date: Authors:
WLAN.
An Analytical Study of Wireless Error Models for Bluetooth Networks Hao-Hsiang Hung and Ling-Jyh Chen Academia Sinica.
Doc.: IEEE /00144r0 Submission 3/01 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks Dialog with FCC Nada.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Key Areas of Research based on the workshop held at IIM Ahmedabad on 6 th July, 2013 Prof Rekha Jain Executive Chair IIMA IDEA Telecom Centre of Excellence,
Wireless LAN Concepts. Wireless LAN Standards.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
Network Communications Chapter 15 Wireless LANs. IEEE b 11 Mbit/s Encrypted (but questionable security) Figure 15.1: Peer-to-PeerFigure 15.2: Access.
SPREAD SPECTRUM AND MULTIPLE ACCESS. Consider a situation There is a big gathering You and your friend are attending You want to communicate something.
Adam Schlesinger NASA – JSC November 3, 2011
David S. L. Wei Joint Work with Alex Chia-Chun Hsu and C.-C. Jay Kuo
doc.: IEEE <doc#>
BLUETOOTH THE STANDARD & ISSUES.
Subject Name: Digital Communication Subject Code: 10EC61
Suman Bhunia and Shamik Sengupta
A Wireless LAN technologies IEEE
Channel Allocation (MAC)
Adam Schlesinger NASA – JSC November 3, 2011
Mobile Handset Networking Overview
Bluetooth, RFID, Data Link Layer Switching
Classification of modulation
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
“I don’t have to be careful, I’ve got a gun.”
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Cognitive Radio Networks
Non contiguous additional bandwidth mode
Bluetooth SIG Coexistence Working Group
Wireless LAN (WLAN) Wireless Ethernet Bluetooth.
UWB Spectrum Allocations
Tony Sun, Guang Yang, Ling-Jyh Chen, M. Y. Sanadidi, Mario Gerla
Spectrum Sharing in Cognitive Radio Networks
Subject Name: Adhoc Networks Subject Code: 10CS841
Wireless LAN Technologies and Products
Emilia Nisha D’souza [ ]
Month Year doc.: IEEE yy/xxxxr0 August 2019
Presentation transcript:

Practical Bluetooth Traffic Sniffing: Systems and Privacy Implications ‘‘ ’’ Wahhab Albazrqaoe Jun Huang Guoliang Xing

Security  Target  Exploit  Solution

Target: Bluetooth    Secret hopping phase Vendor-dependent adaptive hopping  Interference in the crowded 2.4 GHz band

Exploit: BlueEar     Traffic filtering Basic channel acquisition Adapted channel acquisition  Interference avoidance

System Architecture

DESIGN OF BLUEEAR    Clock Acquisition Sub-channel Classification Selective Jamming

Brute Force Clock Acquisition

Problem

Selective Jamming

Packet-based Classifier

Spectrum Sensing-based Classifier

Hybrid Classifier

IMPLEMENTATION

PERFORMANCE

How to fix Flip n-20 status of good sub-channels randomly

Thank You! Any Questions?