an analysis of bluetooth security l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
An Analysis of Bluetooth Security PowerPoint Presentation
Download Presentation
An Analysis of Bluetooth Security

Loading in 2 Seconds...

play fullscreen
1 / 17

An Analysis of Bluetooth Security - PowerPoint PPT Presentation


  • 114 Views
  • Uploaded on

An Analysis of Bluetooth Security. Jaymin Shah Sushma Kamuni. Introduction. Bluetooth It is an open wireless protocol for exchanging data over short distances from fixed and mobile devices, creating personal area network. Act as a reliable source of transmission for voice and data.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'An Analysis of Bluetooth Security' - deborah


Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
an analysis of bluetooth security

An Analysis of Bluetooth Security

Jaymin Shah

SushmaKamuni

introduction
Introduction
  • Bluetooth
    • It is an open wireless protocol for exchanging data over short distances from fixed and mobile devices, creating personal area network.
    • Act as a reliable source of transmission for voice and data
slide3

Designed to operate in the ISM band

  • Gaussian Frequency Shift Keying is used
  • Data rate of 1Mb/sec can be achieved
  • Features: Low cost, low power and robustness
bluetooth security
Bluetooth Security
  • Authentication:Verifies the identification of the devices that are communicating in the channel.
  • Confidentiality: Protecting the data from the attacker by allowing only authorized users to access the data.
  • Authorization: Only authorized users have control over the resources.
security features of bluetooth
Security features of Bluetooth
  • Security Mode 1: Non-Secure Mode
  • Security Mode 2: Service level enforced security mode
  • Security Mode 3: Link-level enforced security mode
authentication summary
Authentication Summary

BD_ADDRB

Verifier

Claimant

AU_RAND

SRES

Calculates SRES’

Success if match

Authentication Process

confidentiality
Confidentiality

Confidentiality security service protects the eavesdropping attack on air-interface.

bluetooth encryption process
Bluetooth Encryption Process
  • Encryption Mode 1: No encryption is needed.
  • Encryption Mode 2: Encrypted using link key keys.
  • Encryption Mode 3: All traffic is encrypted.
trust levels service levels and authentication
Trust levels, service levels and authentication
  • Service level 1:Requires authentication and authorization.
  • Service level 2: Requires only authentication.
  • Service level 3: Open to all bluetooth devices.
security threats
Security Threats
  • Denial of service: Makes the device unusable and drains the mobile device battery.
  • Fuzzing attacks: Sending malformed messages to the bluetooth device.
  • Blue jacking: Causes harm when the user sends the data to the other user.
  • Blue snarfing: Uses IMEI identifier to route all the incoming calls.
future
Future
  • Broadcast Channel: Adoption of Bluetooth in the mobile phones from the Bluetooth information points.
  • Topology Management: Configuration should be invisible and the messages to the users in the scatternet.
  • Quality of Service: Video and audio transmission of data with high quality.
references
References
  • http://www.bluetooth.com/Bluetooth/Technology/Basics.htm
  • http://en.wikipedia.org/wiki/Bluetooth
  • http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf
  • Software Security Technologies, A programmable approach, By Prof. Richard Sinn.
  • http://www.urel.feec.vutbr.cz/ra2008/archive/ra2006/abstracts/085.pdf
  • http://en.wikipedia.org/wiki/Bluetooth
  • http://csrc.nist.gov/publications/nistpubs/800-121/SP800-121.pdf