Bluetooth Security - PowerPoint PPT Presentation

1 / 31
About This Presentation
Title:

Bluetooth Security

Description:

Bluetooth 1.0 and 1.0b were the first official standards approved by ... Backdoor hacking. Bluejacking. DoS attacks. Battery draining DoS. Redfang. 3.1 Tests ... – PowerPoint PPT presentation

Number of Views:223
Avg rating:3.0/5.0
Slides: 32
Provided by: filips
Category:

less

Transcript and Presenter's Notes

Title: Bluetooth Security


1
Bluetooth Security
  • Ken Friezen
  • Filip Sedivy

2
Agenda
1. INTRODUCTION
2. SECURITY ISSUES
3. TESTS AND RESULTS
4. QUESTIONS
3
1.1 History of Bluetooth technology
  • Bluetooth is relatively new wireless technology.
    Designed with following in mind
  • Low power
  • Low cost
  • Secure
  • Uses ISM Band of 2.4 GHz

4
1.2 Bluetooth 1.0 and 1.0b
  • Bluetooth 1.0 and 1.0b were the first official
    standards approved by the Bluetooth SIG.
  • Numerous standardization issues
  • Interoperability issues

5
1.3 Bluetooth 1.1
  • Bluetooth 1.1 was a basically a security and
    functional upgrade over 1.0 and 1.0b.
  • Interoperability issues improved
  • Security tightened
  • Frequency availability solved in France, Spain,
    Japan and few other countries.

6
1.4 Bluetooth 1.2
  • Bluetooth 1.2 improvements
  • Backwards compatible with 1.0, 1.0b and 1.1
  • Adaptive Frequency Hopping (AFH) allows better
    coexistence in the ISM Band
  • Voice quality improved
  • Faster transmission speeds in practice

7
1.5 Bluetooth 2.0
  • Bluetooth 2.0 EDR is the newest update
  • Backwards compatible with 1.x family
  • High bandwidth up to 3 Mbit/s (streaming
    CD-quality audio, digital image transfer)
  • 50 less power requirements
  • Quality of service built-in
  • Faster response times

8
1.6 Technical specifications
  • Bluetooth devices fall in 3 different power
    classes
  • Class 3 1 mW (0 dBm) 0.1-10 meter range
  • Class 2 1-2.5 mW (4 dBm) 10 meter range
  • Class 1 100 mW (100 dBm) 100 meter range
  • Uses ISM Band (2.400-2.483.5 GHz )
  • Modulation used Gaussian Frequency Shift Keying
    (GFSK)
  • Frequency Hopping Spread Spectrum (FHSS) 1600
    hops/sec, 79 channels, 1 MHz separation


9
1.7 Overall cons and pros of Bluetooth technology

  • Advantages
  • Low power requirements
  • Bluetooth chipsets relatively low cost (now)
  • No wires needed
  • Use of unlicensed ISM radio spectrum
  • International channel compatibility

10
1.8 Overall cons and pros of Bluetooth technology

  • Disadvantages
  • Limited signal strength
  • Slower transmission speeds (1.x family)
  • Security set by users

11
2.1 Key management
  • Link Keys
  • Unit Keys
  • Initialization Keys
  • Combination Keys
  • Master Keys

12
2.2 Encryption
  • Is done with a cipher stream EO
  • Re-synchronized for each payload
  • Cipher stream consists of payload key generator,
    keystream generator, and encryption/decryption
    part
  • Encryption mode 1
  • Encryption mode 2
  • Encryption mode 3
  • Encryption Key

13
2.3 Authentication
  • Uses a challenge response strategy
  • Uses symmetric keys
  • Authenticated Ciphering Offset
  • Used application determines who is authenticated,
    and may not always be the master
  • Unsuccessful authentication

14
2.4 Problems in the security of Bluetooth
  • Use of the PIN code
  • Generation of the initialization key
  • Unit key scheme
  • Bluetooth Device Address

15
2.5 Bluetooth attacks
  • Backdoor hacking
  • Bluejacking
  • DoS attacks
  • Battery draining DoS
  • Redfang

16
3.1 Tests
  • Test considerations
  • Discover devices in use and their settings if
    possible
  • Prove that Bluetooth can be detected from long
    distances

17
3.2 Long distance tests
18
3.3 Long distance tests
19
3.4 Long distance tests
20
3.5 Long distance tests
21
3.6 Long distance tests
22
3.7 Long distance tests
23
3.8 Device discovery tests
24
3.9 Device discovery tests
25
3.10 Device discovery tests
26
3.11 Device discovery tests
27
3.12 Device discovery tests
28
3.13 Our goals and how effectively they were
reached
  • Our goals for this project were
  • Research security issues with Bluetooth devices
  • Discover devices in use
  • Prove that Bluetooth can be detected from long
    distances
  • Recommend security procedures if possible

29
3.14 Recommendations
  • The following is a list of recommendations
  • Avoid the use of unit keys. Use combination keys
  • Perform paring in an environment that is secure
    as possible from eavesdroppers
  • Use long random passkeys
  • Restrict service discovery access profile (SPD)
    to trusted devices

30
3.15 Conclusion
  • Our conclusion confirmed that
  • Bluetooth devices can be discovered from long
    distances
  • There are security risks associated with the use
    of Bluetooth devices
  • Most users are not aware of the Bluetooth feature
    on their devices or use it

31
4. QUESTIONS
  • Any questions?
  • Comments?
Write a Comment
User Comments (0)
About PowerShow.com