University of Virginia 1 Gregory LammGerlando Falauto Jorge EstradaJag Gadiyaram November 29, 2000 Identifying and Assessing Security Issues related to.

Slides:



Advertisements
Similar presentations
Bluetooth.
Advertisements

WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Security Issues in Mobile (Wireless) Ad Hoc Networking By Christopher Levari Student ID:
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
By Abdullah M. Dalloul… Abdullah M. Dalloul… Salman Y. Mansour Salman Y. Mansour Supervisor. Supervisor. Dr.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless & Network Security Lecture 10:
Security Weaknesses in Bluetooth by Markus Jakobsson and Susanne Wetzel Lucent Technologies – Bell Labs presented by Boris Kurktchiev.
Bluetooth Security How security is implemented for services running on Bluetooth devices, and future security issues for this technology By Scott Anson.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 6 Wireless Network Security Part II.
BLUETOOTH The Universal Radio Interface for ad hoc, Wireless Connectivity By Jeffrey Adams.
Networks Olga Agnew Bryant Likes Daewon Seo.
1/17 Bluetooth Security Ain Shams University Faculty of Engineering Integrated Circuits Lab Presented by: Mohammed Abdelsattar Ismail Sameh Talal Magd-El-Din.
Bluetooth Network Prepared By: Sara Ayad Aldehany.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Bluetooth Introduction The Bluetooth Technology
By: Trevor Parker, Minh-Tri Le. Bluetooth is a wireless technology that is a low-cost, low-power, short-range radio for ad-hoc wireless communication,
By Alisia Dunham & Chiana Grant.  1994: L.M. Ericsson company had an idea of connecting mobile phones to other devices without cable  1998: SIG (Special.
Chapter 2 Mobile Technologies Lecture 3 By :Jigar M Pandya
Respected Sir & dear friends. Presented by Mohd. Sufiyan MCA –Vth Sem Sec-A2 GIMT (Gr. Noida)
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Bluetooth Technology Jason Babel Kyle Musal Joshua Turella Zdravko Tyankov.
Bluetooth By Richard B. Heisler, Jr. Villanova University Distributed Systems CSC 8530 Fall 2006 Instructor - Dr. Paul A. Schragger.
Wireless Networks Tamus, Zoltán Ádám
Distributed Topology Construction of Bluetooth Personal Area Networks Theodoros Salonidis, Pravin Bhagwat, Leandros Tassiulas and Richard LaMaire.
An Analysis of Bluetooth Security
Bluetooth Address or Name Sharing By Joseph Charboneau.
DIUF, Seminar in Telecommunications, M. Hayoz The Bluetooth TM wireless technology A brief overview.
INTRODUCTION TO BLUETOOTH Named after tenth-century danish King Harald Blatand. Developed by Special Interest Group (SIG). Bluetooth wireless technology.
A Bluetooth Scatternet-Route Structure for Multihop Ad Hoc Networks Yong Liu, Myung J. Lee, and Tarek N. Saadawi 2003 IEEE Journal on Selected Areas in.
IWD2243 Wireless & Mobile Security Chapter 4 : Security in Wireless Ad Hoc Network Prepared by : Zuraidy Adnan, FITM UNISEL1.
Wireless LANs Wireless Technologies for LANs –Radio –Infrared light (as in TV remote control) –Ideal for mobile devices –Useful when wiring would.
An Introduction to BLUETOOTH TECHNOLOGY
By S.Karthika Menon N.Shanti sree.  Designed to connect both mobile devices and peripherals that currently requires a wire.  “USB without wires” 
Wireless Network Security Presented by: Prabhakaran Theertharaman.
GENERAL PRESENTATION ON BLUETOOTH Neeraj Dhiman.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
Bluetooth By Christian Doyle. Overview What is Bluetooth? What’s with the name? Establishing a connection Multiplexing Piconets Scatternets Architecture.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
An Analysis of Bluetooth Security Team A: Padmaja Sriraman Padmapriya Gudipati Sreenivasulu Lekkala.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Overview of the security weaknesses in Bluetooth Dave Singelée COSIC seminar 11/06/2003.
Remote Access for Mobile Computing Andrew Jessett NT Support and Development Group (a.k.a. PC Support) Business and Information.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
Technology By :-. What Is Bluetooth? Designed to be used to connect both mobile devices and peripherals that currently require a wire Short range wireless.
Sonal Jain, IT-BHU Bluetooth Mobile Ad Hoc Networks Sonal Jain B.Tech (IV), Electrical Engg. Dept.,ITBHU IEEE SPAVes Sept 14, 15 Institute.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Development of a Bluetooth based web camera module.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
Standard: Security Methods Jason Gibson TCM471 Professor Crum.
Bluetooth Technology -Prepared By Jasmin Patel -Guided By Jagruti Goswami.
Respected Mam Madhurima Presented by Sharath Kumar.
Respected Ma’am & Dear friends
Bluetooth Technology -Prepared By Jasmin Patel -Guided By Jagruti Goswami.
Presented by Khaled Al Otaishan
Physical layer protocol bluetooth
Wireless Technologies
A Wireless LAN technologies IEEE
“I don’t have to be careful, I’ve got a gun.”
PREPARED BY: RIDDHI PATEL (09CE085)
Topic- Bluetooth Architecture
Bluetooth Bluetooth is a wireless LAN technology designed to connect devices of different functions when they are at a short distance from each other A.
Presentation transcript:

University of Virginia 1 Gregory LammGerlando Falauto Jorge EstradaJag Gadiyaram November 29, 2000 Identifying and Assessing Security Issues related to Bluetooth Wireless Networks

University of Virginia 2 A Christmas Carol Charles Dickens had it right-for every major issue (or story) in the world, there is usually a Past, a Present and a Future that are clearly identifiable. Group 11 would like to tell you a story.

University of Virginia 3 The Ghost of Bluetooth Past 10 th Century Danish King (unified warring Viking Tribes): Harald Bluetooth No Wireless Networks prior to 20 th Century New Wireless Transmission Schemes for the 21 st Century –802.11b –Home Radio Frequency –Bluetooth (version 1.0)

University of Virginia 4 Past Bluetooth Attacks 1.Third Party Eavesdropping & Impersonating 2.Stealing Addresses from a Bluetooth Device  Tracking the device through the network  Impersonate a device AB C

University of Virginia 5 Ad hoc Networks Bluetooth Chip: $50 Range: 10 meters (30 feet) Throughput: 720,000 bps Peer to Peer Piconet (8/250) Scatternet (10 Piconets) The Ghost of Bluetooth Present

University of Virginia 6 Bluetooth ( Special Interest Group) 1,900 Bluetooth Technology Manufactures

University of Virginia 7 Bluetooth Applications

University of Virginia 8 Bluetooth Development Local Area Network (LAN) Wireless Phone Network Small Network Large Throughput IR or Radio Communication Relays not used Fixed with limited mobility Small Distances Large Network Small Throughput Radio Communication Relays used Mobility Large Distances

University of Virginia 9 Bluetooth Overview Local Area Network (LAN) Wireless Phone Network Encryption Authentication Communication Challenge-Response Scheme SAFER+ None/One-way/Mutual Needed for encryption Optional Symmetric Stream Cipher Negotiable Key Size (8-128 bits) Clock dependent Radio Frequency Hopping (1600 Hps) 2.4GHz Frequency Range RF Interface 720 Kbps – 4 Mbps

University of Virginia 10 Bluetooth Communication Link Manager Protocol (LMP) –Configure, authenticate and handle the connections –Power management scheme Radio Frequency Communications (RF C) –Controls Frequency Hopping for Bluetooth Logical Link Control (LLC) –Link Management –Security Management –QoS Management –Transmission Scheduling

University of Virginia 11 Bluetooth Authentication Link key generation K LINK PIN Random # SRES’ SRES ACO’ ACO Encryption key generation SRES’ BD_ADDR B CHECK SRES = SRES’ E 1 (SAFER+) BD_ADDR B K LINK AU_RAND E 1 (SAFER+) BD_ADDR B K LINK AU_RAND A (Verifier) B (Claimant) AU_RAND

University of Virginia 12 Bluetooth Encryption E0E0 BD_ADDR A clock A K C’ K cipher data A-B data B-A E0E0 BD_ADDR A clock A K’ C’ K’ cipher data A-B data B-A data AB = Is everything OK? Yes, BUT... Is everything OK? Yes, BUT...

University of Virginia 13 The Ghost of Bluetooth Future Encryption – Plain Text Attack Authentication – Unit Key Stealing Communication – Impersonation Security Weaknesses

University of Virginia 14 Bluetooth Applications

University of Virginia 15 Conclusions As Viking Hackers, we believe that Bluetooth has some vulnerabilities and some increased security measures are needed. Security Functionality