A SEMINAR REPORT
ON
“BLUETOOTH NETWORK SECURITY”
Is submitted to
Jawaharlal Nehru Technological University, Anantapururam
In partial fulfillment of
The requirements for the award of the degree of
BACHELOR OF TECHNOLOGY
In
ELECTRONICS AND COMMUNICATION ENGINEERING
Submitted By
NAME: V.R.SREEKANTH RAO REG NO:149F1A0461
Under the Co-Ordination of
C. MURALI MOHAN M.Tech,Ph.D Dr. N.A.V.PRASAD M.Tech,Ph.D
Associate Professor, ECE Dept. Professor and HOD, ECE Dept.
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
SRI VENKATESWARA INSTITUTE OF TECHNOLGY
(Affiliated to J.N.T.UNIVERSITY, ANANTAPUR)
NH-44, HAMPAPURAM, ANANTAPURURAM - 515 722
2018
BLUETOOTH NETWORK SECURITY
SUBMITTED BY
V.R SREEKANTH RAO
149F1A0461
DEPT. OF ECE
SVIT
CONTENTS
o INTRODUCTION
o ABOUT BLUETOOTH
o BLUETOOTH NETWORKS
o BLUETOOTH ARCHITECTURE
o SECURITY ASPECTS IN BLUETOOTH
o ATTACKING TOOLS OR TRICKS
o ATTACKING SOFTWARE
o ADVANTAGES
o DISADVANTAGES
o APPLICATIONS
o REFERENCES
INTRODUCTION
o Wireless communications offer
organizations and users many benefits.
o Bluetooth is managed by the Bluetooth
Special Interest Group (SIG)
o Founded in year 1998.
ABOUT BLUETOOTH
o Bluetooth is a wireless LAN technology
Bluetooth specification is:
o The 802.11 WLAN standards.
o Using 2.4 GHz--2.4835 GHz
o Frequency-hopping spread-spectrum (FHSS) technology to
solve interference problems.
o Transmission speeds up to 1 Mbps.
Bluetooth Classes and Ranges
CLASS Range (in mts)
Class 1 ~100m
Class 2 ~10m
Class 3 ~1m
BLUETOOTH NETWORKS
Bluetooth devices can form three types of networks:
Point to Point Link
Piconet Network
Ad-hoc or Scatternet Network
BLUETOOTH ARCHITECTURE
SECURITY ASPECTS IN BLUETOOTH
The Bluetooth-system provide security at two level-
1)At Link layer
o Four different entities are used for maintaining
security at the link layer.
Entity Size
BD_ADDR 48 bits
Private user key, Authentication 128 bits
Private user key, encryption configurable length (Byte
wise)
8-128 bits
RAND 128 bits
2)At Application layer
ATTACKING TOOLS OR TRICKS
o Blue jacking
o OBEX Push
o Blue snarfing
o Hello Moto
o Blue bugging
o DOS (Denial of service) Attacks
o Long Distance Attacking (Blue Sniper)
o Blueprinting
ATTACKING SOFTWARE
For Discovering Bluetooth Devices
o Blue Scanner
o Blue Sniff
o BT Browser
o BT Crawler
FOR HACKING BLUETOOTH DEVICES:
o Blue Bugger
o CIHWB
o Blue diving
o Blue snarfer
o BT crack
o Blooover II
o Blue Test
o BT Audit
ADVANTAGES
o It is cheap.
o Easy to install.
o It makes connecting to different devices convenient .
o It is wireless.
o It is free to use if the device is installed with it.
DISADVANTAGES
o It can be hacked.
o If installed on a cell phone it is prone to receiving cell
phone viruses.
o It only allows short range communication between
devices.
o It can only connect two devices at once.
o It can lose connection in certain conditions.
APPLICATION
o Wireless communication between a mobile phone
and a hands free headset. This was one of the
earliest applications to become popular.
o Wireless communication with iOS and Android
device phones, tablets and portable wireless
speakers.
o Wireless communication with PC input and output
devices, the most common being
the mouse, keyboard and printer.
o Short-range transmission of health sensor data
from medical devices to mobile phone.
REFERENCES
o 1.Data Communication and Networking, 4th edition, Behrouz A
Forouzan.
o 2.http://trifinite.org
o 3.http://en.wikipedia.org/wiki/Bluetooth/
o 4.Wireless Network Security 802.11, Bluetooth and Handheld
Devices, National Institute of Standards and Technology, Technology
Administration, U.S. Department of Commerce.
o 5.BLUETOOTH SPECIFICATION Version 2.1 + EDR [vol 0] ,
www.Bluetooth.com
o 6.Andreas Becker, “Bluetooth Security and Hacks”, Ruhr-University
Bochum, 2007.
o 7.Essential Bluetooth hacking tools, http://www.security-
hacks.com/2007/05/25/essential bluetooth hacking-tools.
o 8.Marek Bialoglow, “Bluetooth Security Review”,
http://www.securityfocus.com/infocus/1830
Bluetooth Network security

Bluetooth Network security

  • 1.
    A SEMINAR REPORT ON “BLUETOOTHNETWORK SECURITY” Is submitted to Jawaharlal Nehru Technological University, Anantapururam In partial fulfillment of The requirements for the award of the degree of BACHELOR OF TECHNOLOGY In ELECTRONICS AND COMMUNICATION ENGINEERING Submitted By NAME: V.R.SREEKANTH RAO REG NO:149F1A0461 Under the Co-Ordination of C. MURALI MOHAN M.Tech,Ph.D Dr. N.A.V.PRASAD M.Tech,Ph.D Associate Professor, ECE Dept. Professor and HOD, ECE Dept. DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING SRI VENKATESWARA INSTITUTE OF TECHNOLGY (Affiliated to J.N.T.UNIVERSITY, ANANTAPUR) NH-44, HAMPAPURAM, ANANTAPURURAM - 515 722 2018
  • 2.
    BLUETOOTH NETWORK SECURITY SUBMITTEDBY V.R SREEKANTH RAO 149F1A0461 DEPT. OF ECE SVIT
  • 3.
    CONTENTS o INTRODUCTION o ABOUTBLUETOOTH o BLUETOOTH NETWORKS o BLUETOOTH ARCHITECTURE o SECURITY ASPECTS IN BLUETOOTH o ATTACKING TOOLS OR TRICKS o ATTACKING SOFTWARE o ADVANTAGES o DISADVANTAGES o APPLICATIONS o REFERENCES
  • 4.
    INTRODUCTION o Wireless communicationsoffer organizations and users many benefits. o Bluetooth is managed by the Bluetooth Special Interest Group (SIG) o Founded in year 1998.
  • 5.
    ABOUT BLUETOOTH o Bluetoothis a wireless LAN technology Bluetooth specification is: o The 802.11 WLAN standards. o Using 2.4 GHz--2.4835 GHz o Frequency-hopping spread-spectrum (FHSS) technology to solve interference problems. o Transmission speeds up to 1 Mbps.
  • 6.
    Bluetooth Classes andRanges CLASS Range (in mts) Class 1 ~100m Class 2 ~10m Class 3 ~1m
  • 7.
    BLUETOOTH NETWORKS Bluetooth devicescan form three types of networks: Point to Point Link
  • 8.
  • 9.
  • 10.
  • 11.
    SECURITY ASPECTS INBLUETOOTH The Bluetooth-system provide security at two level- 1)At Link layer o Four different entities are used for maintaining security at the link layer. Entity Size BD_ADDR 48 bits Private user key, Authentication 128 bits Private user key, encryption configurable length (Byte wise) 8-128 bits RAND 128 bits
  • 12.
  • 13.
    ATTACKING TOOLS ORTRICKS o Blue jacking o OBEX Push o Blue snarfing o Hello Moto o Blue bugging o DOS (Denial of service) Attacks o Long Distance Attacking (Blue Sniper) o Blueprinting
  • 14.
    ATTACKING SOFTWARE For DiscoveringBluetooth Devices o Blue Scanner o Blue Sniff o BT Browser o BT Crawler FOR HACKING BLUETOOTH DEVICES: o Blue Bugger o CIHWB o Blue diving o Blue snarfer o BT crack o Blooover II o Blue Test o BT Audit
  • 15.
    ADVANTAGES o It ischeap. o Easy to install. o It makes connecting to different devices convenient . o It is wireless. o It is free to use if the device is installed with it.
  • 16.
    DISADVANTAGES o It canbe hacked. o If installed on a cell phone it is prone to receiving cell phone viruses. o It only allows short range communication between devices. o It can only connect two devices at once. o It can lose connection in certain conditions.
  • 17.
    APPLICATION o Wireless communicationbetween a mobile phone and a hands free headset. This was one of the earliest applications to become popular. o Wireless communication with iOS and Android device phones, tablets and portable wireless speakers. o Wireless communication with PC input and output devices, the most common being the mouse, keyboard and printer. o Short-range transmission of health sensor data from medical devices to mobile phone.
  • 18.
    REFERENCES o 1.Data Communicationand Networking, 4th edition, Behrouz A Forouzan. o 2.http://trifinite.org o 3.http://en.wikipedia.org/wiki/Bluetooth/ o 4.Wireless Network Security 802.11, Bluetooth and Handheld Devices, National Institute of Standards and Technology, Technology Administration, U.S. Department of Commerce. o 5.BLUETOOTH SPECIFICATION Version 2.1 + EDR [vol 0] , www.Bluetooth.com o 6.Andreas Becker, “Bluetooth Security and Hacks”, Ruhr-University Bochum, 2007. o 7.Essential Bluetooth hacking tools, http://www.security- hacks.com/2007/05/25/essential bluetooth hacking-tools. o 8.Marek Bialoglow, “Bluetooth Security Review”, http://www.securityfocus.com/infocus/1830