SlideShare une entreprise Scribd logo
1  sur  24
Bluetooth Security
Presenting By…
SHANTANU KRISHNA
Reg. no. 1791210007
Branch:-TCN
1
Outline:-
Introduction
History
Bluetooth Security
Security Mode of Bluetooth
Protocols in Bluetooth
Most important security weaknesses
Denial of service attacks
References
2
Introduction
• Bluetooth is a wireless radio specification, design to replace
cable as the medium for data and voice signal between
electronics device.
• Bluetooth design on small size, low power consumption and
low cost.
• Mostly it uses in Laptop computers, cellular phones, PDA’s,
Headset, keyboards, as well as in digital camera and other
consumer electronics devices.
• 362 million Bluetooth devices has shipped in 2004.
3
Introduction (Contd.)
• Uses the radio range of 2.45 GHz
• Theoretical maximum bandwidth is 1 Mb/s
• Several Bluetooth devices can form an ad hoc network called
a “piconet”
– In a piconet one device acts as a master (sets frequency
hopping behavior) and the others as slaves.
– Example: A conference room with many laptops wishing to
communicate with each other.
• Range < 10m.
• Piconets: 1 master and up to 7 slaves.
4
History
• The original architect of Bluetooth, named after the 10th
century “Danish King” HARALD BLUETOOTH.
• The original Architect was the Ericsson Mobile
Communication.
• In 1998, IBM, Intel, Nokia and Toshiba formed the Bluetooth
SIG (Special Interest Group).
• Standardize within the IEEE 802.15 Personal Area Network
(PAN) Working Group.
5
Bluetooth Security
• Authentication: Verifies the identification of the devices
that are communicating in the channel.
• Confidentiality: Protecting the data from the attacker by
allowing only authorized users to access the data.
• Authorization: Only authorized users have control over
the resources.
6
Security Mode of Bluetooth
• Security Mode 1: No-Secure Mode, (There won’t be any
authentication or encryption in this mode. Bluetooth
device can easily be connected with the other devices).
• Security Mode 2: Service level security mode, (The
management of the access control and interfaces with
other protocols and device users is handled by the
centralized security manager, it includes Authentication,
Configuration and Authorization).
• Security Mode 3: Link-level security mode, (This is a
built in security mechanism that offers the authentication
(unidirectional or mutual) and encryption based on the
secret key shared by the pair of devices).
7
Protocols in Bluetooth
1. Generation of unit key.
2. Generation of initialization key.
3. Generation Combination Key.
4. Authentication.
5. Generation of encryption key.
6. Generation of key stream.
7. Encryption of data.
8
1. Generation unit key
E21
RANDA (128)
ADDRA (48 bit)
Unit key KA 128)
•It is a Semi permanent Key.
•Bluetooth Device Operated for the First time.
9
2. Generation initialization key
E22 E22
PIN <_128
IN_RAND (128) IN_RAND (128)
PIN <_128
L L
IN_RAND
Kinit (128)Kinit (128)
•it’s a temporarily Key.
•Communication between two Device (P’=PIN + BD_ADDR).
•XOR Operation. Here Unit key = Link key.
10
3. Generation Combination Key
• The Combination key is the combination of two generated in a
device A and B, Respectively.
• Each device generates a random no. LK_RANDA and
LK_RANDB.
• Then utilizing E21 they generate LK_KA and LK_KB respectively.
• LK_K=E21 (LK_RAND, BD_ADDR)
• LK_KA and LK_KB are XORed with the current link key.
• Device A calculate LK_RANDA and Device B calculate
LK_RANDB.
• KAB is calculated simply by XORing LK_KA and LK_KB.
11
3. Generation Combination Key (Contd.)
Kinit
KA = Klink
K
Kinit
KA = Klink
12
3. Generation Combination Key (Contd.)
KAB =Klink
LK_RANDA
LK_RANDB
E21 E21
E21 E21
ADDRA ADDRB
LK_RANDA LK_RANDB
KAB =Klink
ADDRB ADDRA
LK_RANDB LK_RANDB
LKA
LKALKB
LKB
13
4. Authentication
• Both device A & B use the common link key for
authentication, they don’t need generate a new Kinit. During
each authentication a new AU_RANDA is issued.
• Authentication uses a challenge-response scheme in which a
claimant’s Knowledge of a secret key is checked through a 2-
step protocol using symmetric secret key.
• It return SRES to the verifier.
• When the authentication attempt fails, for each subsequent
authentication failure with the same Bluetooth Device
address, the waiting interval is increased exponentially.
14
4. Authentication (Contd.)
ADDRB
E1 E1
ADDRB
AU_RAND
Klink
AU_RAND
SRES
AU_RAND
Klink
ADDRB
SRES SRESACO ACO (Auth. Cipher
offset)
15
Authentication (Contd.)
16
Authentication Summary
Parameter Length Secrecy parameter
Device Address 48 Bits Public
Random Challenge 128 Bits Public
Authentication (SRES)
Response
32 Bits Public
Link Key 128 Bits Secret
BD_ADDRB
Verifier Claimant
Calculates SRES’
Authentication Process
AU_RAND
SRES
Success if match
17
5. Generation encryption key
EN_RAND
E3 E3
EN_RAND EN_RAND
Klink
Klink
ACO ACO
KC KC
18
6. Generation key stream
E0 E0
ADDRA
clockMASTER
KC
KCIPHER KCIPHER
ADDRA
clockMASTER
KC
19
7. Encryption of data
KCIPHER (96) KCIPHER (96)
KCIPHER (96) KCIPHER (96)
DATA
DATA DATA
DATA
20
Most important security weaknesses
• Problems with E0
• Unit key
• PIN
• Problems with E1
• Location privacy
• Denial of service attacks
21
Denial of service attacks
• Radio jamming attacks.
• Buffer overflow attacks.
• Blocking of other devices.
• Battery exhaustion (e.g., sleep deprivation torture attack).
22
References
THE SPEC: Security implimentation
http://www.bluetooth.com/pdf/Bluetooth_11_Specifications
_Book.pdf
Träskbäck M, Security in Bluetooth: An overview of Bluetooth
security, 2000-11-2
http://www.cs.hut.fi/Opinnot/Tik86.174/Bluetooth_Security.p
df
Vainio J., Bluetooth Security, 2000-05-25
http://www.niksula.cs.hut.fi/~jiitv/bluesec.html
Knowledge Base on Bluetooth:
http://www.palowireless.com/infotooth/knowbase.asp
23
Thanking You…
24

Contenu connexe

Tendances (20)

Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Transmission Medium
Transmission MediumTransmission Medium
Transmission Medium
 
Bluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkBluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor Network
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
D2D - Device to Device Communication
D2D - Device to Device CommunicationD2D - Device to Device Communication
D2D - Device to Device Communication
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
Ethernet
EthernetEthernet
Ethernet
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 

En vedette

Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentationKrishna Kumari
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksSiya Agarwal
 
Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]Ahsaan Arain
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth VulnerabilitiesVictorYee
 
Supercapacitor
SupercapacitorSupercapacitor
SupercapacitorSaleem Mir
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentationwayn
 

En vedette (12)

Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
 
Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
 
Supercapacitors
SupercapacitorsSupercapacitors
Supercapacitors
 
Supercapacitors ppt hhd
Supercapacitors ppt hhdSupercapacitors ppt hhd
Supercapacitors ppt hhd
 
Ultracapacitors
UltracapacitorsUltracapacitors
Ultracapacitors
 
Supercapacitor
SupercapacitorSupercapacitor
Supercapacitor
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Supercapacitors
SupercapacitorsSupercapacitors
Supercapacitors
 

Similaire à Bluetooth security

Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyFReeze FRancis
 
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfDEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfFelipe Prado
 
Webinar Embarcados: BLE MESH
Webinar Embarcados: BLE MESHWebinar Embarcados: BLE MESH
Webinar Embarcados: BLE MESHEmbarcados
 
17.security level of services
17.security level of services17.security level of services
17.security level of servicesPramod Rathore
 
124647123-Bluetooth.ppt
124647123-Bluetooth.ppt124647123-Bluetooth.ppt
124647123-Bluetooth.pptMEGHAB26
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technologySuman Bhattacharyya
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic VersionAyesha Saeed
 
Short blutooth present
Short blutooth present Short blutooth present
Short blutooth present syedishaq
 
Design device driver for wireless device using 32 bit microcontroller
Design device driver for wireless device using 32 bit microcontrollerDesign device driver for wireless device using 32 bit microcontroller
Design device driver for wireless device using 32 bit microcontrollerkantha123
 
Bluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationBluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationMuhammed Afsal Villan
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basicEngr Sid
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfshubhangisonawane6
 

Similaire à Bluetooth security (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case Study
 
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfDEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
 
Webinar Embarcados: BLE MESH
Webinar Embarcados: BLE MESHWebinar Embarcados: BLE MESH
Webinar Embarcados: BLE MESH
 
17.security level of services
17.security level of services17.security level of services
17.security level of services
 
IoT setup and pairing
IoT setup and pairingIoT setup and pairing
IoT setup and pairing
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
124647123-Bluetooth.ppt
124647123-Bluetooth.ppt124647123-Bluetooth.ppt
124647123-Bluetooth.ppt
 
Teknologi Bluetooth
Teknologi BluetoothTeknologi Bluetooth
Teknologi Bluetooth
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
Short blutooth present
Short blutooth present Short blutooth present
Short blutooth present
 
Design device driver for wireless device using 32 bit microcontroller
Design device driver for wireless device using 32 bit microcontrollerDesign device driver for wireless device using 32 bit microcontroller
Design device driver for wireless device using 32 bit microcontroller
 
Bluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationBluetooth - Comprehensive Presentation
Bluetooth - Comprehensive Presentation
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
BLE Talk
BLE TalkBLE Talk
BLE Talk
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Dernier

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Dernier (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Bluetooth security

  • 1. Bluetooth Security Presenting By… SHANTANU KRISHNA Reg. no. 1791210007 Branch:-TCN 1
  • 2. Outline:- Introduction History Bluetooth Security Security Mode of Bluetooth Protocols in Bluetooth Most important security weaknesses Denial of service attacks References 2
  • 3. Introduction • Bluetooth is a wireless radio specification, design to replace cable as the medium for data and voice signal between electronics device. • Bluetooth design on small size, low power consumption and low cost. • Mostly it uses in Laptop computers, cellular phones, PDA’s, Headset, keyboards, as well as in digital camera and other consumer electronics devices. • 362 million Bluetooth devices has shipped in 2004. 3
  • 4. Introduction (Contd.) • Uses the radio range of 2.45 GHz • Theoretical maximum bandwidth is 1 Mb/s • Several Bluetooth devices can form an ad hoc network called a “piconet” – In a piconet one device acts as a master (sets frequency hopping behavior) and the others as slaves. – Example: A conference room with many laptops wishing to communicate with each other. • Range < 10m. • Piconets: 1 master and up to 7 slaves. 4
  • 5. History • The original architect of Bluetooth, named after the 10th century “Danish King” HARALD BLUETOOTH. • The original Architect was the Ericsson Mobile Communication. • In 1998, IBM, Intel, Nokia and Toshiba formed the Bluetooth SIG (Special Interest Group). • Standardize within the IEEE 802.15 Personal Area Network (PAN) Working Group. 5
  • 6. Bluetooth Security • Authentication: Verifies the identification of the devices that are communicating in the channel. • Confidentiality: Protecting the data from the attacker by allowing only authorized users to access the data. • Authorization: Only authorized users have control over the resources. 6
  • 7. Security Mode of Bluetooth • Security Mode 1: No-Secure Mode, (There won’t be any authentication or encryption in this mode. Bluetooth device can easily be connected with the other devices). • Security Mode 2: Service level security mode, (The management of the access control and interfaces with other protocols and device users is handled by the centralized security manager, it includes Authentication, Configuration and Authorization). • Security Mode 3: Link-level security mode, (This is a built in security mechanism that offers the authentication (unidirectional or mutual) and encryption based on the secret key shared by the pair of devices). 7
  • 8. Protocols in Bluetooth 1. Generation of unit key. 2. Generation of initialization key. 3. Generation Combination Key. 4. Authentication. 5. Generation of encryption key. 6. Generation of key stream. 7. Encryption of data. 8
  • 9. 1. Generation unit key E21 RANDA (128) ADDRA (48 bit) Unit key KA 128) •It is a Semi permanent Key. •Bluetooth Device Operated for the First time. 9
  • 10. 2. Generation initialization key E22 E22 PIN <_128 IN_RAND (128) IN_RAND (128) PIN <_128 L L IN_RAND Kinit (128)Kinit (128) •it’s a temporarily Key. •Communication between two Device (P’=PIN + BD_ADDR). •XOR Operation. Here Unit key = Link key. 10
  • 11. 3. Generation Combination Key • The Combination key is the combination of two generated in a device A and B, Respectively. • Each device generates a random no. LK_RANDA and LK_RANDB. • Then utilizing E21 they generate LK_KA and LK_KB respectively. • LK_K=E21 (LK_RAND, BD_ADDR) • LK_KA and LK_KB are XORed with the current link key. • Device A calculate LK_RANDA and Device B calculate LK_RANDB. • KAB is calculated simply by XORing LK_KA and LK_KB. 11
  • 12. 3. Generation Combination Key (Contd.) Kinit KA = Klink K Kinit KA = Klink 12
  • 13. 3. Generation Combination Key (Contd.) KAB =Klink LK_RANDA LK_RANDB E21 E21 E21 E21 ADDRA ADDRB LK_RANDA LK_RANDB KAB =Klink ADDRB ADDRA LK_RANDB LK_RANDB LKA LKALKB LKB 13
  • 14. 4. Authentication • Both device A & B use the common link key for authentication, they don’t need generate a new Kinit. During each authentication a new AU_RANDA is issued. • Authentication uses a challenge-response scheme in which a claimant’s Knowledge of a secret key is checked through a 2- step protocol using symmetric secret key. • It return SRES to the verifier. • When the authentication attempt fails, for each subsequent authentication failure with the same Bluetooth Device address, the waiting interval is increased exponentially. 14
  • 15. 4. Authentication (Contd.) ADDRB E1 E1 ADDRB AU_RAND Klink AU_RAND SRES AU_RAND Klink ADDRB SRES SRESACO ACO (Auth. Cipher offset) 15
  • 17. Authentication Summary Parameter Length Secrecy parameter Device Address 48 Bits Public Random Challenge 128 Bits Public Authentication (SRES) Response 32 Bits Public Link Key 128 Bits Secret BD_ADDRB Verifier Claimant Calculates SRES’ Authentication Process AU_RAND SRES Success if match 17
  • 18. 5. Generation encryption key EN_RAND E3 E3 EN_RAND EN_RAND Klink Klink ACO ACO KC KC 18
  • 19. 6. Generation key stream E0 E0 ADDRA clockMASTER KC KCIPHER KCIPHER ADDRA clockMASTER KC 19
  • 20. 7. Encryption of data KCIPHER (96) KCIPHER (96) KCIPHER (96) KCIPHER (96) DATA DATA DATA DATA 20
  • 21. Most important security weaknesses • Problems with E0 • Unit key • PIN • Problems with E1 • Location privacy • Denial of service attacks 21
  • 22. Denial of service attacks • Radio jamming attacks. • Buffer overflow attacks. • Blocking of other devices. • Battery exhaustion (e.g., sleep deprivation torture attack). 22
  • 23. References THE SPEC: Security implimentation http://www.bluetooth.com/pdf/Bluetooth_11_Specifications _Book.pdf Träskbäck M, Security in Bluetooth: An overview of Bluetooth security, 2000-11-2 http://www.cs.hut.fi/Opinnot/Tik86.174/Bluetooth_Security.p df Vainio J., Bluetooth Security, 2000-05-25 http://www.niksula.cs.hut.fi/~jiitv/bluesec.html Knowledge Base on Bluetooth: http://www.palowireless.com/infotooth/knowbase.asp 23

Notes de l'éditeur

  1. First, Claimant transmits its 48 bit address to the verifier. (BD_ADDR) Verifier responses it by sending 128 bit random challenge. (AU_RAND)Now with the help of some algorithm E1, the verifier compute the authentication response using the address, link key and random challenge as input. Claimant performs the same operation.The claimant returns the response, SRES, to the verifier.The verifier compares the own response with the response of the claimant.If both the 32 bit SRES values get equal, then the verifier will continue the connection.