Download presentation
Presentation is loading. Please wait.
Published byNancy Webster Modified over 9 years ago
1
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji
2
Introduction to Bluetooth Bluetooth has become very popular because: Power efficiency Low costs Short range radio frequency wireless device Bluetooth is a Personal Area Network (PAN) wireless device and can be used for: –Portable laptops –Printers –Keyboards –Headsets –Cell phones –GPS devices –Ipod’s –PDA’s –Automobile equipment 2
3
Introduction to Bluetooth History: Bluetooth name came from Denmark. Originally created by Jaap Haartsen and Sven Mattisson working for Ericsson in 1994. Further developed by Special Interest Group (SIG) including: Ericsson IBM Nokia Intel Toshiba In 1999, other companies added support including 3Com Corporation, Lucent Technologies, Microsoft and Motorola 3
4
Introduction to Bluetooth Bluetooth features… Frequency ~ 2.5GHz. Communication is point to point or one point to several connections. Used globally without a license. 10 to 100 meter transmit distances at 1Mbps. Uses ad-hoc network, also called piconet. In a piconet, one device acts as master and other devices as slaves. Maximum of seven slaves Low and high level of power depending on room size Synchronous and asynchronous communication channels wikipedia 4
5
Bluetooth Devices Google Images 5
6
Bluetooth: Security Risks Significant target due to popularity Newer technology means bugs and vulnerabilities Numerous types of devices means different problems for each 6
7
PCs and Bluetooth Ad-Hoc network in meeting Some hubs have no router-like security (simple relay) Class 1 Bluetooth devices can extend 300 feet Problems with fixed passkey Short key means easy to guess Separate keys for different types of access is recommended but rarely used (Linux) Initial key exchange is unencrypted Hacker could extrapolate key (similar to cracking WEP encryption) 7
8
Bluetooth Passwords Using one passkey for all connections Instead of unique keys to each pairing, all devices (Laptop, PDA, Cell Phone, Printer, Headset, etc.) use same passkey Hacker accesses one trusted device, all devices are now vulnerable MAC address problems Can identify MAC address and monitor traffic on device (class example of 2 companies merging) MAC unencrypted regardless of other encryption Standard Linux commands can be used # hcitool scan Scanning... 00:0A:D9:15:0B:1C T610-phone 8
9
Cracking Bluetooth RedFang Scans MACs one at a time Odds of finding are low Average 3-10sec / address Sony Ericsson alone has 16,777,216 possible = 1,000+ days Devices available to analyze Bluetooth data Cost prohibitive ($9500.00) 9
10
Cracking Bluetooth Cont. Uses frequency hopping to deter, sequence is only pseudo-random 1600 hops/second Possibly find hop sequence and collect data Owner forgets to disable device discovery Unable to change MAC Phone always allows connection attempt without prompting user One device must enter discoverable mode to make connection 10
11
Device ID Weakness 2 devices attempting to link are identified by name Equipment not identified by unique MAC address Leaves door open to exploit people (social engineering) Paris Hilton cell phone incident 11
12
Current & Future Solutions Simple password Between 1 and 16 numbers (128bit) Some devices have hard-coded passwords Basic encryption method, no variance What else?! Bluetooth Wifi 12
13
Current & Future Solutions Security Mode 1 Device does not initiate special security mechanism but responds to authentication requests No Encryption Security Mode 2 Use of security mechanisms determined by trust status. Security is performed after authentication requests from other devices Broadcast traffic is unencrypted Security Mode 3 Authentication is necessary for connection establishment All traffic is encrypted. 13
14
Current & Future Solutions Simple current solutions Lower the transmission power Set to un-discoverable Pairing in an inception-proof environment Use complex keys 14
15
Current & Future Solutions Example : ActerBlue Designed to make mobile e-commerce secure via Bluetooth Done through onboard biometric ID system Passwords are removed – instead, fingerprint images are processed/stored on the card 15
16
Current & Future Solutions Hardware access point? Allows owner to create up to 8 users with unique passwords. Connects by standard ethernet More secure than standard Bluetooth? Belkin F8T030 16
17
References: http://books.google.com/books?id=- fUR0OGZ7bQC&pg=PA58&lpg=PA58&dq=bluetooth+combination+key&source=we b&ots=RwkD5ANJcH&sig=FAheS6Y29uE3EUqLZRMgS3i5v5I http://www.securityfocus.com/infocus/1830 http://www.bluetooth-headset.co.uk/images/jabra%20jx10%20hub.bmp http://windowsecurity.com/articles/Bluetooth-Security-Threat.html http://www.cyberindian.net/wp-content/uploads/sony-ericsson-k790i-mobile- phones.jpg http://www.askdavetaylor.com/sync_motorola_razr_v3c_with_windows_xp_via_blu etooth.html 17
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.