SlideShare a Scribd company logo
Bluetooth Security
Presenting By…
SHANTANU KRISHNA
Reg. no. 1791210007
Branch:-TCN
1
Outline:-
Introduction
History
Bluetooth Security
Security Mode of Bluetooth
Protocols in Bluetooth
Most important security weaknesses
Denial of service attacks
References
2
Introduction
• Bluetooth is a wireless radio specification, design to replace
cable as the medium for data and voice signal between
electronics device.
• Bluetooth design on small size, low power consumption and
low cost.
• Mostly it uses in Laptop computers, cellular phones, PDA’s,
Headset, keyboards, as well as in digital camera and other
consumer electronics devices.
• 362 million Bluetooth devices has shipped in 2004.
3
Introduction (Contd.)
• Uses the radio range of 2.45 GHz
• Theoretical maximum bandwidth is 1 Mb/s
• Several Bluetooth devices can form an ad hoc network called
a “piconet”
– In a piconet one device acts as a master (sets frequency
hopping behavior) and the others as slaves.
– Example: A conference room with many laptops wishing to
communicate with each other.
• Range < 10m.
• Piconets: 1 master and up to 7 slaves.
4
History
• The original architect of Bluetooth, named after the 10th
century “Danish King” HARALD BLUETOOTH.
• The original Architect was the Ericsson Mobile
Communication.
• In 1998, IBM, Intel, Nokia and Toshiba formed the Bluetooth
SIG (Special Interest Group).
• Standardize within the IEEE 802.15 Personal Area Network
(PAN) Working Group.
5
Bluetooth Security
• Authentication: Verifies the identification of the devices
that are communicating in the channel.
• Confidentiality: Protecting the data from the attacker by
allowing only authorized users to access the data.
• Authorization: Only authorized users have control over
the resources.
6
Security Mode of Bluetooth
• Security Mode 1: No-Secure Mode, (There won’t be any
authentication or encryption in this mode. Bluetooth
device can easily be connected with the other devices).
• Security Mode 2: Service level security mode, (The
management of the access control and interfaces with
other protocols and device users is handled by the
centralized security manager, it includes Authentication,
Configuration and Authorization).
• Security Mode 3: Link-level security mode, (This is a
built in security mechanism that offers the authentication
(unidirectional or mutual) and encryption based on the
secret key shared by the pair of devices).
7
Protocols in Bluetooth
1. Generation of unit key.
2. Generation of initialization key.
3. Generation Combination Key.
4. Authentication.
5. Generation of encryption key.
6. Generation of key stream.
7. Encryption of data.
8
1. Generation unit key
E21
RANDA (128)
ADDRA (48 bit)
Unit key KA 128)
•It is a Semi permanent Key.
•Bluetooth Device Operated for the First time.
9
2. Generation initialization key
E22 E22
PIN <_128
IN_RAND (128) IN_RAND (128)
PIN <_128
L L
IN_RAND
Kinit (128)Kinit (128)
•it’s a temporarily Key.
•Communication between two Device (P’=PIN + BD_ADDR).
•XOR Operation. Here Unit key = Link key.
10
3. Generation Combination Key
• The Combination key is the combination of two generated in a
device A and B, Respectively.
• Each device generates a random no. LK_RANDA and
LK_RANDB.
• Then utilizing E21 they generate LK_KA and LK_KB respectively.
• LK_K=E21 (LK_RAND, BD_ADDR)
• LK_KA and LK_KB are XORed with the current link key.
• Device A calculate LK_RANDA and Device B calculate
LK_RANDB.
• KAB is calculated simply by XORing LK_KA and LK_KB.
11
3. Generation Combination Key (Contd.)
Kinit
KA = Klink
K
Kinit
KA = Klink
12
3. Generation Combination Key (Contd.)
KAB =Klink
LK_RANDA
LK_RANDB
E21 E21
E21 E21
ADDRA ADDRB
LK_RANDA LK_RANDB
KAB =Klink
ADDRB ADDRA
LK_RANDB LK_RANDB
LKA
LKALKB
LKB
13
4. Authentication
• Both device A & B use the common link key for
authentication, they don’t need generate a new Kinit. During
each authentication a new AU_RANDA is issued.
• Authentication uses a challenge-response scheme in which a
claimant’s Knowledge of a secret key is checked through a 2-
step protocol using symmetric secret key.
• It return SRES to the verifier.
• When the authentication attempt fails, for each subsequent
authentication failure with the same Bluetooth Device
address, the waiting interval is increased exponentially.
14
4. Authentication (Contd.)
ADDRB
E1 E1
ADDRB
AU_RAND
Klink
AU_RAND
SRES
AU_RAND
Klink
ADDRB
SRES SRESACO ACO (Auth. Cipher
offset)
15
Authentication (Contd.)
16
Authentication Summary
Parameter Length Secrecy parameter
Device Address 48 Bits Public
Random Challenge 128 Bits Public
Authentication (SRES)
Response
32 Bits Public
Link Key 128 Bits Secret
BD_ADDRB
Verifier Claimant
Calculates SRES’
Authentication Process
AU_RAND
SRES
Success if match
17
5. Generation encryption key
EN_RAND
E3 E3
EN_RAND EN_RAND
Klink
Klink
ACO ACO
KC KC
18
6. Generation key stream
E0 E0
ADDRA
clockMASTER
KC
KCIPHER KCIPHER
ADDRA
clockMASTER
KC
19
7. Encryption of data
KCIPHER (96) KCIPHER (96)
KCIPHER (96) KCIPHER (96)
DATA
DATA DATA
DATA
20
Most important security weaknesses
• Problems with E0
• Unit key
• PIN
• Problems with E1
• Location privacy
• Denial of service attacks
21
Denial of service attacks
• Radio jamming attacks.
• Buffer overflow attacks.
• Blocking of other devices.
• Battery exhaustion (e.g., sleep deprivation torture attack).
22
References
THE SPEC: Security implimentation
http://www.bluetooth.com/pdf/Bluetooth_11_Specifications
_Book.pdf
Träskbäck M, Security in Bluetooth: An overview of Bluetooth
security, 2000-11-2
http://www.cs.hut.fi/Opinnot/Tik86.174/Bluetooth_Security.p
df
Vainio J., Bluetooth Security, 2000-05-25
http://www.niksula.cs.hut.fi/~jiitv/bluesec.html
Knowledge Base on Bluetooth:
http://www.palowireless.com/infotooth/knowbase.asp
23
Thanking You…
24

More Related Content

What's hot

Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
NEEVEE Technologies
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
ROHIT SAGAR
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stackstuimrozsm
 
Bluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkBluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor Network
Gyanendra Prakash
 
Bluetooth
BluetoothBluetooth
Bluetooth
Priyanka Anni
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
RK Nayak
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
AJAL A J
 
Bluetooth
BluetoothBluetooth
Bluetooth
Samraiz Tejani
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Saikiran Panjala
 
Bluetooth
BluetoothBluetooth
Bluetooth
Kashyap Shah
 
Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8
RUpaliLohar
 
bluejacking
bluejackingbluejacking
bluejacking
Jyoti Chintadi
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
Mateen Shahid
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic VersionAyesha Saeed
 
Bluetooth
BluetoothBluetooth
Bluetooth
Anamika Garg
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhanaSadhana28
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
Himangshu Hazra
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
Rohit Roy
 

What's hot (20)

Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
 
Bluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkBluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor Network
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Gsm Security and Attacks
Gsm Security and AttacksGsm Security and Attacks
Gsm Security and Attacks
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8
 
bluejacking
bluejackingbluejacking
bluejacking
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 

Viewers also liked

Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
Krishna Kumari
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksSiya Agarwal
 
Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]
Ahsaan Arain
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
VictorYee
 
Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
securityxploded
 
Supercapacitors
SupercapacitorsSupercapacitors
Supercapacitors
Seminar Links
 
Supercapacitors ppt hhd
Supercapacitors ppt hhdSupercapacitors ppt hhd
Supercapacitors ppt hhd
Hrishikesh Dixit
 
Ultracapacitors
UltracapacitorsUltracapacitors
Ultracapacitors
Vivek Nandan
 
Supercapacitor
SupercapacitorSupercapacitor
SupercapacitorSaleem Mir
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentationwayn
 
Bluetooth
BluetoothBluetooth
Bluetooth
Bhushan Bagde
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth TechnologyManish Sharma
 

Viewers also liked (13)

Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
 
Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
 
Supercapacitors
SupercapacitorsSupercapacitors
Supercapacitors
 
Supercapacitors ppt hhd
Supercapacitors ppt hhdSupercapacitors ppt hhd
Supercapacitors ppt hhd
 
Ultracapacitors
UltracapacitorsUltracapacitors
Ultracapacitors
 
Supercapacitor
SupercapacitorSupercapacitor
Supercapacitor
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Supercapacitors
SupercapacitorsSupercapacitors
Supercapacitors
 

Similar to Bluetooth security

Bluetooth
BluetoothBluetooth
Bluetooth
Fahim Faysal
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case Study
FReeze FRancis
 
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfDEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
Felipe Prado
 
Webinar Embarcados: BLE MESH
Webinar Embarcados: BLE MESHWebinar Embarcados: BLE MESH
Webinar Embarcados: BLE MESH
Embarcados
 
17.security level of services
17.security level of services17.security level of services
17.security level of services
Pramod Rathore
 
IoT setup and pairing
IoT setup and pairingIoT setup and pairing
IoT setup and pairing
Guy Vinograd ☁
 
Bluetooth
BluetoothBluetooth
Bluetooth
Swapnil Bangera
 
124647123-Bluetooth.ppt
124647123-Bluetooth.ppt124647123-Bluetooth.ppt
124647123-Bluetooth.ppt
MEGHAB26
 
Teknologi Bluetooth
Teknologi BluetoothTeknologi Bluetooth
Teknologi Bluetooth
'Ariq M Thabrani
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
Suman Bhattacharyya
 
Short blutooth present
Short blutooth present Short blutooth present
Short blutooth present
syedishaq
 
Design device driver for wireless device using 32 bit microcontroller
Design device driver for wireless device using 32 bit microcontrollerDesign device driver for wireless device using 32 bit microcontroller
Design device driver for wireless device using 32 bit microcontroller
kantha123
 
Bluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationBluetooth - Comprehensive Presentation
Bluetooth - Comprehensive Presentation
Muhammed Afsal Villan
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
Engr Sid
 
Bluetooth
BluetoothBluetooth
BLE Talk
BLE TalkBLE Talk
BLE Talk
programmarchy
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
shubhangisonawane6
 

Similar to Bluetooth security (20)

Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case Study
 
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfDEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
 
Webinar Embarcados: BLE MESH
Webinar Embarcados: BLE MESHWebinar Embarcados: BLE MESH
Webinar Embarcados: BLE MESH
 
17.security level of services
17.security level of services17.security level of services
17.security level of services
 
IoT setup and pairing
IoT setup and pairingIoT setup and pairing
IoT setup and pairing
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
124647123-Bluetooth.ppt
124647123-Bluetooth.ppt124647123-Bluetooth.ppt
124647123-Bluetooth.ppt
 
Teknologi Bluetooth
Teknologi BluetoothTeknologi Bluetooth
Teknologi Bluetooth
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Short blutooth present
Short blutooth present Short blutooth present
Short blutooth present
 
Design device driver for wireless device using 32 bit microcontroller
Design device driver for wireless device using 32 bit microcontrollerDesign device driver for wireless device using 32 bit microcontroller
Design device driver for wireless device using 32 bit microcontroller
 
Bluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationBluetooth - Comprehensive Presentation
Bluetooth - Comprehensive Presentation
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
BLE Talk
BLE TalkBLE Talk
BLE Talk
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 

Bluetooth security

  • 1. Bluetooth Security Presenting By… SHANTANU KRISHNA Reg. no. 1791210007 Branch:-TCN 1
  • 2. Outline:- Introduction History Bluetooth Security Security Mode of Bluetooth Protocols in Bluetooth Most important security weaknesses Denial of service attacks References 2
  • 3. Introduction • Bluetooth is a wireless radio specification, design to replace cable as the medium for data and voice signal between electronics device. • Bluetooth design on small size, low power consumption and low cost. • Mostly it uses in Laptop computers, cellular phones, PDA’s, Headset, keyboards, as well as in digital camera and other consumer electronics devices. • 362 million Bluetooth devices has shipped in 2004. 3
  • 4. Introduction (Contd.) • Uses the radio range of 2.45 GHz • Theoretical maximum bandwidth is 1 Mb/s • Several Bluetooth devices can form an ad hoc network called a “piconet” – In a piconet one device acts as a master (sets frequency hopping behavior) and the others as slaves. – Example: A conference room with many laptops wishing to communicate with each other. • Range < 10m. • Piconets: 1 master and up to 7 slaves. 4
  • 5. History • The original architect of Bluetooth, named after the 10th century “Danish King” HARALD BLUETOOTH. • The original Architect was the Ericsson Mobile Communication. • In 1998, IBM, Intel, Nokia and Toshiba formed the Bluetooth SIG (Special Interest Group). • Standardize within the IEEE 802.15 Personal Area Network (PAN) Working Group. 5
  • 6. Bluetooth Security • Authentication: Verifies the identification of the devices that are communicating in the channel. • Confidentiality: Protecting the data from the attacker by allowing only authorized users to access the data. • Authorization: Only authorized users have control over the resources. 6
  • 7. Security Mode of Bluetooth • Security Mode 1: No-Secure Mode, (There won’t be any authentication or encryption in this mode. Bluetooth device can easily be connected with the other devices). • Security Mode 2: Service level security mode, (The management of the access control and interfaces with other protocols and device users is handled by the centralized security manager, it includes Authentication, Configuration and Authorization). • Security Mode 3: Link-level security mode, (This is a built in security mechanism that offers the authentication (unidirectional or mutual) and encryption based on the secret key shared by the pair of devices). 7
  • 8. Protocols in Bluetooth 1. Generation of unit key. 2. Generation of initialization key. 3. Generation Combination Key. 4. Authentication. 5. Generation of encryption key. 6. Generation of key stream. 7. Encryption of data. 8
  • 9. 1. Generation unit key E21 RANDA (128) ADDRA (48 bit) Unit key KA 128) •It is a Semi permanent Key. •Bluetooth Device Operated for the First time. 9
  • 10. 2. Generation initialization key E22 E22 PIN <_128 IN_RAND (128) IN_RAND (128) PIN <_128 L L IN_RAND Kinit (128)Kinit (128) •it’s a temporarily Key. •Communication between two Device (P’=PIN + BD_ADDR). •XOR Operation. Here Unit key = Link key. 10
  • 11. 3. Generation Combination Key • The Combination key is the combination of two generated in a device A and B, Respectively. • Each device generates a random no. LK_RANDA and LK_RANDB. • Then utilizing E21 they generate LK_KA and LK_KB respectively. • LK_K=E21 (LK_RAND, BD_ADDR) • LK_KA and LK_KB are XORed with the current link key. • Device A calculate LK_RANDA and Device B calculate LK_RANDB. • KAB is calculated simply by XORing LK_KA and LK_KB. 11
  • 12. 3. Generation Combination Key (Contd.) Kinit KA = Klink K Kinit KA = Klink 12
  • 13. 3. Generation Combination Key (Contd.) KAB =Klink LK_RANDA LK_RANDB E21 E21 E21 E21 ADDRA ADDRB LK_RANDA LK_RANDB KAB =Klink ADDRB ADDRA LK_RANDB LK_RANDB LKA LKALKB LKB 13
  • 14. 4. Authentication • Both device A & B use the common link key for authentication, they don’t need generate a new Kinit. During each authentication a new AU_RANDA is issued. • Authentication uses a challenge-response scheme in which a claimant’s Knowledge of a secret key is checked through a 2- step protocol using symmetric secret key. • It return SRES to the verifier. • When the authentication attempt fails, for each subsequent authentication failure with the same Bluetooth Device address, the waiting interval is increased exponentially. 14
  • 15. 4. Authentication (Contd.) ADDRB E1 E1 ADDRB AU_RAND Klink AU_RAND SRES AU_RAND Klink ADDRB SRES SRESACO ACO (Auth. Cipher offset) 15
  • 17. Authentication Summary Parameter Length Secrecy parameter Device Address 48 Bits Public Random Challenge 128 Bits Public Authentication (SRES) Response 32 Bits Public Link Key 128 Bits Secret BD_ADDRB Verifier Claimant Calculates SRES’ Authentication Process AU_RAND SRES Success if match 17
  • 18. 5. Generation encryption key EN_RAND E3 E3 EN_RAND EN_RAND Klink Klink ACO ACO KC KC 18
  • 19. 6. Generation key stream E0 E0 ADDRA clockMASTER KC KCIPHER KCIPHER ADDRA clockMASTER KC 19
  • 20. 7. Encryption of data KCIPHER (96) KCIPHER (96) KCIPHER (96) KCIPHER (96) DATA DATA DATA DATA 20
  • 21. Most important security weaknesses • Problems with E0 • Unit key • PIN • Problems with E1 • Location privacy • Denial of service attacks 21
  • 22. Denial of service attacks • Radio jamming attacks. • Buffer overflow attacks. • Blocking of other devices. • Battery exhaustion (e.g., sleep deprivation torture attack). 22
  • 23. References THE SPEC: Security implimentation http://www.bluetooth.com/pdf/Bluetooth_11_Specifications _Book.pdf Träskbäck M, Security in Bluetooth: An overview of Bluetooth security, 2000-11-2 http://www.cs.hut.fi/Opinnot/Tik86.174/Bluetooth_Security.p df Vainio J., Bluetooth Security, 2000-05-25 http://www.niksula.cs.hut.fi/~jiitv/bluesec.html Knowledge Base on Bluetooth: http://www.palowireless.com/infotooth/knowbase.asp 23

Editor's Notes

  1. First, Claimant transmits its 48 bit address to the verifier. (BD_ADDR) Verifier responses it by sending 128 bit random challenge. (AU_RAND)Now with the help of some algorithm E1, the verifier compute the authentication response using the address, link key and random challenge as input. Claimant performs the same operation.The claimant returns the response, SRES, to the verifier.The verifier compares the own response with the response of the claimant.If both the 32 bit SRES values get equal, then the verifier will continue the connection.