SlideShare a Scribd company logo
Prof. Neeraj Bhargava
Pramod Singh Rathore
Department of Computer Science
School of Engineering & System Sciences,
MDS University Ajmer, Rajasthan, India
1
Disclosure Threat: leaking of information
from a system to an unwanted party.
Confidentiality violation.
Integrity Threat: unauthorized changes of
information during transmission.
Denial of Service Threat: resources blocked
by malicious attacker. Availability
violation.
 Authentication: process of determining
the identity of another user.
 Authorization: process of deciding if
device A has the access rights to device B.
Notion of “trusted”
 Symmetric Key Security: generally, A
trusts B if B can prove that it has the
same shared key that A does.
 There is no centralized, trusted third
party for a wireless network
 User Authentication becomes harder
 Authentication must go across a
network without being cracked
 Device uniqueness: low battery denial
of service attacks!
 Ad Hoc Networks of Multiple Types of
Devices: PDAs, Laptops, Mobile Phones
 Piconets: Small Clusters (Max Size 8) of
Devices Forming an Ad Hoc Network.
Masters Determine the Frequency. Piconet
Example: Transfer of Files Between
Participants at a Meeting.
 Scatternets: Larger Networks Formed of
up to 10 Piconets.
June 1999
Tom Siep, Texas InstrumentsSlide 13
doc.: IEEE 802.15-99/014r8
Submission
Bluetooth and IEEE Structure
Bluetooth
Physical Layer
(PHY)
Medium Access Layer
(MAC)
Logical Link Control
(LLC)
Physical
Data Link
Network
Transport
Session
Presentation
Application7
6
5
4
3
2
1
ISO OSI
Layers
IEEE 802
Standards
Hardware
Software
Transport Control Protocol (TCP)
Internet Protocol (IP)
X.400 and X.500 EMAIL
 Link Manager’s involvement with security
depends on Bluetooth security mode: only the
strictest setting requires that data link
implement security.
 Security for pairing, authentication and
encryption is implemented by both software
and hardware at this layer.
 We will later look at the specifics.
 RFCOMM: enforces the security policy for
dial-up networking and other services
relying on a serial port. Supports emulation
of multiple serial ports between two
devices. Session Layer.
 L2CAPP: Logical Link and Adaption Protocol.
Manages the creation and termination of
virtual connections called channels with
other devices. Negotiates and dictates
security parameters for channel
establishment. Network/Transport Layer
A service and a device data store
 Answers access requests by protocol implementations (e.g.
L2CAPP) or higher layers: R2COMM, applications.
 Enforces authentication and encryption if they are needed
before connecting to application
 Initiates setting up “trusted” pairings and gets PIN codes
from users, saves addresses of other devices.
 Mode 1: No security other than against “casual
eavesdroppers”
 Mode 2: Service Level Security: established
after creating the channel, above datalink layer.
 Mode 3: Datalink Level Security: security
initiated before establishing channel, by the Link
Manager, as well as by the Service Level.
Security Mode determines what stage of
connection does security
1.) Inquiry: A device in a new environment will
automatically initiate an inquiry to discover
what access points are within its range. This
will result in the following events:
i.) All nearby access points respond with their
addresses.
ii.) The device picks one out the responding
devices.
2.) Paging: a baseband procedure invoked by a
device which results in synchronization of the
device with the access point, in terms of its
clock offset and phase in the frequency hop,
among other required initializations. (see spec
for details—master/slave issues here).
3.) Link establishment: The LMP will now establish
a link with the access point. If Security Mode 3,
then Pairing (6) begins at this layer.
4.) Service Discovery: The LMP will use the
SDP(Service Discovery Protocol) to discover what
services are available.
5.) L2CAP channel created: With information
obtained from SDP, a L2CAP channel is created.
This may be directly used by the application or by
another protocol (e.g. RFCOMM)
6.) Pairing begins here if in Security Mode 2.
Security Manager of access point is consulted:
--checks security mode and service security
policy, if security is required, the access
point transmits a security request for
“pairing”
--pairing is only successful if the user knows
the pin of the access point
--the PIN is not transmitted over the wireless
channel but another key generated from it is
used, so that the PIN is not compromised.
--Encryption will be invoked if secure mode is
used.
Trust level of the device determines which
services that device has access to.
Trusted Device: The device has been previously
authenticated, a link key is stored and the device is
marked as "trusted" in the Device Database.
Untrusted Device: The device has been previously
authenticated, a link key is stored but the device is
not marked as "trusted" in the Device Database
Unknown Device: No security information is
available for this device, e.g. untrusted
 Only security at this level is by the nature of the
connection: data-hopping and short-distance
 Bluetooth devices transmit over the unlicensed
2.45GHz radio band, the same band used by
microwave ovens and cordless phones.(FHSS)
 All Bluetooth devices employ “data-hopping”,
which entails skipping around the radio band up to
1600 times per second, at 1MHz intervals (79
different frequencies)
 Most connections are less than 10 meters, so there
is a limit as to eavesdropping possibilities
 Service Access depends on device:
1. Trusted devices have unrestricted access to
all services, fixed relationship to other
devices
2. Untrusted devices generally have no
permanent relationship and services that it
has access to are limited.
 Unfortunately, all services on a device are
given the same security policy, other than
application layer add-ons.
 Services can have one of 3
security levels:
Level 3: Requires Authentication and
Authorization. PIN number must be
entered.
Level 2: Authentication only, fixed PIN ok.
Level 1: Open to all devices, the default
level. Security for legacy applications, for
example.
 Security is implemented by symmetric keys in
a challenge-response system.
 Security implementations in Bluetooth units
are all the same, and are publicly available:
http://www.bluetooth.com/pdf/Bluetooth_11_S
pecifications_Book.pdf
 Critical ingredients:PIN, BD_ADDR,
RAND(), Link and Encryption Keys
 PIN: up to 128 bit number, can be fixed
(entered in only one device), or can be
entered in both devices. If fixed, much lower
security.
 BD_ADDR: Bluetooth device address, unique
48 bit sequence. (IEEE). Devices must know
the address of devices it wants to
communicate with. Addresses are publicly
available via Bluetooth inquiries.
Conversion of Signal
FHSS DSSS / CDMA
Multiple frequencies are used Single frequency is used
Hard to find the user’s
frequency at any instant of time
User frequency, once allotted is
always the same
Frequency reuse is allowed Frequency reuse is not allowed
Sender need not wait Sender has to wait if the
spectrum is busy
Power strength of the signal is
high
Power strength of the signal is
low
Stronger and penetrates
through the obstacles
It is weaker compared to FHSS
It is never affected by
interference
It can be affected by
interference
It is cheaper It is expensive
This is the commonly used
technique
This technique is not frequently
used
 Reduced Crosstalk Interference
 Better Voice Quality/Data and less Noise
 Inherent Security
 Longer Operation Distances
 Hard to Intercept
 Harder to Jammed
Spread Spectrum promises several benefits such
as higher capacity and ability to resist multipath
propagation.
Spread Spectrum signal are difficult to intercept
for an unauthorized person, they are easily
hidden.
For an unauthorized person it is difficult to even
detect their presence in many cases.
25
26

More Related Content

What's hot

Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
Information Technology
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
Full Stack Developer at Electro Mizan Andisheh
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
Raghav Bisht
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
Information Technology
 
Intruders
IntrudersIntruders
Intruders
techn
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
shraddha_b
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
Eng. Mohammed Ahmed Siddiqui
 
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and DemeritsSignature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
david rom
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
Avinash Kumar
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection Systems
Omar Shaya
 
Intruders
IntrudersIntruders
Intruders detection
Intruders detectionIntruders detection
Intruders detection
Ehtisham Ali
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
skpatel91
 
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
ijcsit
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
CSCJournals
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Aparna Bhadran
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
AAKASH S
 

What's hot (20)

Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Intruders
IntrudersIntruders
Intruders
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and DemeritsSignature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection Systems
 
Intruders
IntrudersIntruders
Intruders
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
 
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 

Similar to 11.bluetooth security

IoT setup and pairing
IoT setup and pairingIoT setup and pairing
IoT setup and pairing
Guy Vinograd ☁
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
TAMBEMAHENDRA1
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
IT
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
Yahia Kandeel
 
Firewalls
FirewallsFirewalls
Firewalls
Deevena Dayaal
 
Bluetooth
BluetoothBluetooth
Bluetooth
Swapnil Bangera
 
Aspects of Network Security
Aspects of Network SecurityAspects of Network Security
Aspects of Network Security
SHUBHA CHATURVEDI
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
Anshumali Singh
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
Anshumali Singh
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
inventionjournals
 
Mobile Device Protection Using Sensors
Mobile Device Protection Using SensorsMobile Device Protection Using Sensors
Mobile Device Protection Using Sensors
Editor IJCATR
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
Meet Soni
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
ZahidHussainqaisar
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
Devyani Vaidya
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
Devyani Vaidya
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
AuliaArifWardana
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
J1078184
J1078184J1078184
J1078184
IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Lessson 3
Lessson 3Lessson 3

Similar to 11.bluetooth security (20)

IoT setup and pairing
IoT setup and pairingIoT setup and pairing
IoT setup and pairing
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
Firewalls
FirewallsFirewalls
Firewalls
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Aspects of Network Security
Aspects of Network SecurityAspects of Network Security
Aspects of Network Security
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Mobile Device Protection Using Sensors
Mobile Device Protection Using SensorsMobile Device Protection Using Sensors
Mobile Device Protection Using Sensors
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
 
G011123539
G011123539G011123539
G011123539
 
J1078184
J1078184J1078184
J1078184
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Lessson 3
Lessson 3Lessson 3
Lessson 3
 

More from Pramod Rathore

Restoration by spatial filtering
Restoration by spatial filteringRestoration by spatial filtering
Restoration by spatial filtering
Pramod Rathore
 
Image restoration
Image restorationImage restoration
Image restoration
Pramod Rathore
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filtering
Pramod Rathore
 
Sharpening filtering
Sharpening filteringSharpening filtering
Sharpening filtering
Pramod Rathore
 
Image enhancement in frequency domain
Image enhancement in frequency domainImage enhancement in frequency domain
Image enhancement in frequency domain
Pramod Rathore
 
Image enhancement in fourier transform part ii
Image enhancement in fourier transform  part iiImage enhancement in fourier transform  part ii
Image enhancement in fourier transform part ii
Pramod Rathore
 
Image enhancement in fourier transform
Image enhancement in fourier transformImage enhancement in fourier transform
Image enhancement in fourier transform
Pramod Rathore
 
Control statements
Control statementsControl statements
Control statements
Pramod Rathore
 
Basic image operation
Basic image operationBasic image operation
Basic image operation
Pramod Rathore
 
How to handling strings in r
How to handling strings in rHow to handling strings in r
How to handling strings in r
Pramod Rathore
 
Smoothing spatial filtering
Smoothing spatial filteringSmoothing spatial filtering
Smoothing spatial filtering
Pramod Rathore
 
Handle list in r
Handle list in rHandle list in r
Handle list in r
Pramod Rathore
 
Spatial filtering
Spatial filteringSpatial filtering
Spatial filtering
Pramod Rathore
 
Data types in r
Data types in rData types in r
Data types in r
Pramod Rathore
 
6.histogram processing
6.histogram processing6.histogram processing
6.histogram processing
Pramod Rathore
 
5.image enhancement in spatial domain copy - copy
5.image enhancement in spatial domain   copy - copy5.image enhancement in spatial domain   copy - copy
5.image enhancement in spatial domain copy - copy
Pramod Rathore
 
4.image enhancement in spatial domain copy
4.image enhancement in spatial domain   copy4.image enhancement in spatial domain   copy
4.image enhancement in spatial domain copy
Pramod Rathore
 
Issues in machine learning
Issues in machine learningIssues in machine learning
Issues in machine learning
Pramod Rathore
 
R programming
R programmingR programming
R programming
Pramod Rathore
 
Image enhancement in spatial domain
Image enhancement in spatial domainImage enhancement in spatial domain
Image enhancement in spatial domain
Pramod Rathore
 

More from Pramod Rathore (20)

Restoration by spatial filtering
Restoration by spatial filteringRestoration by spatial filtering
Restoration by spatial filtering
 
Image restoration
Image restorationImage restoration
Image restoration
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filtering
 
Sharpening filtering
Sharpening filteringSharpening filtering
Sharpening filtering
 
Image enhancement in frequency domain
Image enhancement in frequency domainImage enhancement in frequency domain
Image enhancement in frequency domain
 
Image enhancement in fourier transform part ii
Image enhancement in fourier transform  part iiImage enhancement in fourier transform  part ii
Image enhancement in fourier transform part ii
 
Image enhancement in fourier transform
Image enhancement in fourier transformImage enhancement in fourier transform
Image enhancement in fourier transform
 
Control statements
Control statementsControl statements
Control statements
 
Basic image operation
Basic image operationBasic image operation
Basic image operation
 
How to handling strings in r
How to handling strings in rHow to handling strings in r
How to handling strings in r
 
Smoothing spatial filtering
Smoothing spatial filteringSmoothing spatial filtering
Smoothing spatial filtering
 
Handle list in r
Handle list in rHandle list in r
Handle list in r
 
Spatial filtering
Spatial filteringSpatial filtering
Spatial filtering
 
Data types in r
Data types in rData types in r
Data types in r
 
6.histogram processing
6.histogram processing6.histogram processing
6.histogram processing
 
5.image enhancement in spatial domain copy - copy
5.image enhancement in spatial domain   copy - copy5.image enhancement in spatial domain   copy - copy
5.image enhancement in spatial domain copy - copy
 
4.image enhancement in spatial domain copy
4.image enhancement in spatial domain   copy4.image enhancement in spatial domain   copy
4.image enhancement in spatial domain copy
 
Issues in machine learning
Issues in machine learningIssues in machine learning
Issues in machine learning
 
R programming
R programmingR programming
R programming
 
Image enhancement in spatial domain
Image enhancement in spatial domainImage enhancement in spatial domain
Image enhancement in spatial domain
 

Recently uploaded

CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
shreyassri1208
 

Recently uploaded (20)

CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
 

11.bluetooth security

  • 1. Prof. Neeraj Bhargava Pramod Singh Rathore Department of Computer Science School of Engineering & System Sciences, MDS University Ajmer, Rajasthan, India 1
  • 2. Disclosure Threat: leaking of information from a system to an unwanted party. Confidentiality violation. Integrity Threat: unauthorized changes of information during transmission. Denial of Service Threat: resources blocked by malicious attacker. Availability violation.
  • 3.  Authentication: process of determining the identity of another user.  Authorization: process of deciding if device A has the access rights to device B. Notion of “trusted”  Symmetric Key Security: generally, A trusts B if B can prove that it has the same shared key that A does.
  • 4.  There is no centralized, trusted third party for a wireless network  User Authentication becomes harder  Authentication must go across a network without being cracked  Device uniqueness: low battery denial of service attacks!
  • 5.  Ad Hoc Networks of Multiple Types of Devices: PDAs, Laptops, Mobile Phones  Piconets: Small Clusters (Max Size 8) of Devices Forming an Ad Hoc Network. Masters Determine the Frequency. Piconet Example: Transfer of Files Between Participants at a Meeting.  Scatternets: Larger Networks Formed of up to 10 Piconets.
  • 6.
  • 7. June 1999 Tom Siep, Texas InstrumentsSlide 13 doc.: IEEE 802.15-99/014r8 Submission Bluetooth and IEEE Structure Bluetooth Physical Layer (PHY) Medium Access Layer (MAC) Logical Link Control (LLC) Physical Data Link Network Transport Session Presentation Application7 6 5 4 3 2 1 ISO OSI Layers IEEE 802 Standards Hardware Software Transport Control Protocol (TCP) Internet Protocol (IP) X.400 and X.500 EMAIL
  • 8.  Link Manager’s involvement with security depends on Bluetooth security mode: only the strictest setting requires that data link implement security.  Security for pairing, authentication and encryption is implemented by both software and hardware at this layer.  We will later look at the specifics.
  • 9.  RFCOMM: enforces the security policy for dial-up networking and other services relying on a serial port. Supports emulation of multiple serial ports between two devices. Session Layer.  L2CAPP: Logical Link and Adaption Protocol. Manages the creation and termination of virtual connections called channels with other devices. Negotiates and dictates security parameters for channel establishment. Network/Transport Layer
  • 10. A service and a device data store  Answers access requests by protocol implementations (e.g. L2CAPP) or higher layers: R2COMM, applications.  Enforces authentication and encryption if they are needed before connecting to application  Initiates setting up “trusted” pairings and gets PIN codes from users, saves addresses of other devices.
  • 11.  Mode 1: No security other than against “casual eavesdroppers”  Mode 2: Service Level Security: established after creating the channel, above datalink layer.  Mode 3: Datalink Level Security: security initiated before establishing channel, by the Link Manager, as well as by the Service Level. Security Mode determines what stage of connection does security
  • 12. 1.) Inquiry: A device in a new environment will automatically initiate an inquiry to discover what access points are within its range. This will result in the following events: i.) All nearby access points respond with their addresses. ii.) The device picks one out the responding devices. 2.) Paging: a baseband procedure invoked by a device which results in synchronization of the device with the access point, in terms of its clock offset and phase in the frequency hop, among other required initializations. (see spec for details—master/slave issues here).
  • 13. 3.) Link establishment: The LMP will now establish a link with the access point. If Security Mode 3, then Pairing (6) begins at this layer. 4.) Service Discovery: The LMP will use the SDP(Service Discovery Protocol) to discover what services are available. 5.) L2CAP channel created: With information obtained from SDP, a L2CAP channel is created. This may be directly used by the application or by another protocol (e.g. RFCOMM) 6.) Pairing begins here if in Security Mode 2.
  • 14. Security Manager of access point is consulted: --checks security mode and service security policy, if security is required, the access point transmits a security request for “pairing” --pairing is only successful if the user knows the pin of the access point --the PIN is not transmitted over the wireless channel but another key generated from it is used, so that the PIN is not compromised. --Encryption will be invoked if secure mode is used.
  • 15. Trust level of the device determines which services that device has access to. Trusted Device: The device has been previously authenticated, a link key is stored and the device is marked as "trusted" in the Device Database. Untrusted Device: The device has been previously authenticated, a link key is stored but the device is not marked as "trusted" in the Device Database Unknown Device: No security information is available for this device, e.g. untrusted
  • 16.  Only security at this level is by the nature of the connection: data-hopping and short-distance  Bluetooth devices transmit over the unlicensed 2.45GHz radio band, the same band used by microwave ovens and cordless phones.(FHSS)  All Bluetooth devices employ “data-hopping”, which entails skipping around the radio band up to 1600 times per second, at 1MHz intervals (79 different frequencies)  Most connections are less than 10 meters, so there is a limit as to eavesdropping possibilities
  • 17.  Service Access depends on device: 1. Trusted devices have unrestricted access to all services, fixed relationship to other devices 2. Untrusted devices generally have no permanent relationship and services that it has access to are limited.  Unfortunately, all services on a device are given the same security policy, other than application layer add-ons.
  • 18.  Services can have one of 3 security levels: Level 3: Requires Authentication and Authorization. PIN number must be entered. Level 2: Authentication only, fixed PIN ok. Level 1: Open to all devices, the default level. Security for legacy applications, for example.
  • 19.  Security is implemented by symmetric keys in a challenge-response system.  Security implementations in Bluetooth units are all the same, and are publicly available: http://www.bluetooth.com/pdf/Bluetooth_11_S pecifications_Book.pdf  Critical ingredients:PIN, BD_ADDR, RAND(), Link and Encryption Keys
  • 20.  PIN: up to 128 bit number, can be fixed (entered in only one device), or can be entered in both devices. If fixed, much lower security.  BD_ADDR: Bluetooth device address, unique 48 bit sequence. (IEEE). Devices must know the address of devices it wants to communicate with. Addresses are publicly available via Bluetooth inquiries.
  • 22. FHSS DSSS / CDMA Multiple frequencies are used Single frequency is used Hard to find the user’s frequency at any instant of time User frequency, once allotted is always the same Frequency reuse is allowed Frequency reuse is not allowed Sender need not wait Sender has to wait if the spectrum is busy Power strength of the signal is high Power strength of the signal is low Stronger and penetrates through the obstacles It is weaker compared to FHSS It is never affected by interference It can be affected by interference It is cheaper It is expensive This is the commonly used technique This technique is not frequently used
  • 23.  Reduced Crosstalk Interference  Better Voice Quality/Data and less Noise  Inherent Security  Longer Operation Distances  Hard to Intercept  Harder to Jammed
  • 24. Spread Spectrum promises several benefits such as higher capacity and ability to resist multipath propagation. Spread Spectrum signal are difficult to intercept for an unauthorized person, they are easily hidden. For an unauthorized person it is difficult to even detect their presence in many cases.
  • 25. 25
  • 26. 26