SlideShare a Scribd company logo
1 of 13
Presented by:-
Devyani B. Vaidya
 What is bluetooth?
 Specification of Bluetooth
 Bluetooth Security
 Terms in bluetooth security
 Security Threads
 Protocols in Bluetooth
 Location privacy
 Denial of service attacks
 Other weaknesses
 Conclusion
Telecommunication industry specification
that describe how mobile phone ,computer
and personal digital assistant can be easily
interconnected for the purpose of data
transfer using a short-range wireless
communication
1998: Bluetooth SIG
IEEE 802.15
Range < 10m
2.4 GHz ISM band
Spread spectrum & frequency hopping
Piconets: 1 master and up to 7 slaves
How security is implemented for
services running on Bluetooth devices,
and future security issues for this
technology?
A Big issue now a days
 Authentication: process of determining
the identity of another user.
 Authorization: process of deciding if
device A has the access rights to device
B. Notion of “trusted”
 Symmetric Key Security: generally, A
trusts B if B can prove that it has the
same shared key that A does.
Disclosure Threat: leaking of information
from a system to an unwanted party.
Confidentiality violation.
Integrity Threat: unauthorized changes
of information during transmission.
Denial of Service Threat: resources
blocked by malicious attacker.
Availability violation.
1. Generation of unit key
2. Generation of initialization key
3. Generation of link key
4. Mutual authentication
5. Generation of encryption key
6. Generation of key stream
7. Encryption of data
Radio jamming attacks
Buffer overflow attacks
Blocking of other devices
Battery exhaustion (e.g., sleep deprivation
torture attack)
Devices can be in discoverable mode
Every device has fixed hardware adress
Adresses are sent in clear
No integrity checks
No prevention of replay attacks
Man in the middle attacks
Sometimes: default = no security
Bluetooth has quite a lot of security
weaknesses!
Need for secure lightweight protocols
More research needed!!
Bluetooth secuirty issues

More Related Content

What's hot

Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackRashi Dhagat
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security ProjectsPhdtopiccom
 
Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056mashiur
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...Lindsey Landolfi
 
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESManisha Luthra
 
S_IOT_Intro.pptx
S_IOT_Intro.pptxS_IOT_Intro.pptx
S_IOT_Intro.pptxrutika12345
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 
PhD-Guidance-in-Telecommunication-Engineering
PhD-Guidance-in-Telecommunication-EngineeringPhD-Guidance-in-Telecommunication-Engineering
PhD-Guidance-in-Telecommunication-EngineeringPhdtopiccom
 
Out Go The Lights: An enlightening discussion of IoT automation security By D...
Out Go The Lights: An enlightening discussion of IoT automation security By D...Out Go The Lights: An enlightening discussion of IoT automation security By D...
Out Go The Lights: An enlightening discussion of IoT automation security By D...EC-Council
 

What's hot (20)

Iot Security
Iot SecurityIot Security
Iot Security
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security Projects
 
Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
05 wi fi network security
05 wi fi network security05 wi fi network security
05 wi fi network security
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
 
S_IOT_Intro.pptx
S_IOT_Intro.pptxS_IOT_Intro.pptx
S_IOT_Intro.pptx
 
Wireless security
Wireless securityWireless security
Wireless security
 
PhD-Guidance-in-Telecommunication-Engineering
PhD-Guidance-in-Telecommunication-EngineeringPhD-Guidance-in-Telecommunication-Engineering
PhD-Guidance-in-Telecommunication-Engineering
 
Out Go The Lights: An enlightening discussion of IoT automation security By D...
Out Go The Lights: An enlightening discussion of IoT automation security By D...Out Go The Lights: An enlightening discussion of IoT automation security By D...
Out Go The Lights: An enlightening discussion of IoT automation security By D...
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT/M2M Security
IoT/M2M SecurityIoT/M2M Security
IoT/M2M Security
 

Viewers also liked

Viewers also liked (20)

Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
secued cloud ppt
 secued cloud ppt secued cloud ppt
secued cloud ppt
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Resource management
Resource managementResource management
Resource management
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
Bigtable a distributed storage system
Bigtable a distributed storage systemBigtable a distributed storage system
Bigtable a distributed storage system
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
3D Password
3D Password3D Password
3D Password
 
Open and Close Door ppt
 Open and Close Door ppt Open and Close Door ppt
Open and Close Door ppt
 
telephone directory
 telephone directory telephone directory
telephone directory
 
Laptop
LaptopLaptop
Laptop
 
Radio evolution
Radio evolutionRadio evolution
Radio evolution
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Digital locker
Digital lockerDigital locker
Digital locker
 
Data as a service
Data as a service Data as a service
Data as a service
 
Radio & Culture
Radio & CultureRadio & Culture
Radio & Culture
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 

Similar to Bluetooth secuirty issues

Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network securityAnkit Anand
 
Security threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesSecurity threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesIJNSA Journal
 
A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...
A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...
A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...ijwmn
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technologybaralsashank
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-JM code group
 
A Comprehensive Approach to Secure Group Communication in Wireless Networks
A Comprehensive Approach to Secure Group Communication in Wireless NetworksA Comprehensive Approach to Secure Group Communication in Wireless Networks
A Comprehensive Approach to Secure Group Communication in Wireless NetworksDavid González Romero
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdfTouhemiJamel
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
Module7 wireless security-b
Module7 wireless security-bModule7 wireless security-b
Module7 wireless security-bBbAOC
 

Similar to Bluetooth secuirty issues (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Security threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesSecurity threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devices
 
IoT setup and pairing
IoT setup and pairingIoT setup and pairing
IoT setup and pairing
 
A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...
A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...
A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
11.bluetooth security
11.bluetooth security11.bluetooth security
11.bluetooth security
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
 
Bluetooth 27 01-12 PPT
Bluetooth 27 01-12 PPTBluetooth 27 01-12 PPT
Bluetooth 27 01-12 PPT
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
A Comprehensive Approach to Secure Group Communication in Wireless Networks
A Comprehensive Approach to Secure Group Communication in Wireless NetworksA Comprehensive Approach to Secure Group Communication in Wireless Networks
A Comprehensive Approach to Secure Group Communication in Wireless Networks
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Download
DownloadDownload
Download
 
Download
DownloadDownload
Download
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Module7 wireless security-b
Module7 wireless security-bModule7 wireless security-b
Module7 wireless security-b
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Bluetooth secuirty issues

  • 2.  What is bluetooth?  Specification of Bluetooth  Bluetooth Security  Terms in bluetooth security  Security Threads  Protocols in Bluetooth  Location privacy  Denial of service attacks  Other weaknesses  Conclusion
  • 3. Telecommunication industry specification that describe how mobile phone ,computer and personal digital assistant can be easily interconnected for the purpose of data transfer using a short-range wireless communication
  • 4. 1998: Bluetooth SIG IEEE 802.15 Range < 10m 2.4 GHz ISM band Spread spectrum & frequency hopping Piconets: 1 master and up to 7 slaves
  • 5. How security is implemented for services running on Bluetooth devices, and future security issues for this technology? A Big issue now a days
  • 6.  Authentication: process of determining the identity of another user.  Authorization: process of deciding if device A has the access rights to device B. Notion of “trusted”  Symmetric Key Security: generally, A trusts B if B can prove that it has the same shared key that A does.
  • 7. Disclosure Threat: leaking of information from a system to an unwanted party. Confidentiality violation. Integrity Threat: unauthorized changes of information during transmission. Denial of Service Threat: resources blocked by malicious attacker. Availability violation.
  • 8. 1. Generation of unit key 2. Generation of initialization key 3. Generation of link key 4. Mutual authentication 5. Generation of encryption key 6. Generation of key stream 7. Encryption of data
  • 9. Radio jamming attacks Buffer overflow attacks Blocking of other devices Battery exhaustion (e.g., sleep deprivation torture attack)
  • 10. Devices can be in discoverable mode Every device has fixed hardware adress Adresses are sent in clear
  • 11. No integrity checks No prevention of replay attacks Man in the middle attacks Sometimes: default = no security
  • 12. Bluetooth has quite a lot of security weaknesses! Need for secure lightweight protocols More research needed!!