Focus On Bluetooth Security Presented by Kanij Fatema Sharme.

Slides:



Advertisements
Similar presentations
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
NFC Devices: Security and Privacy
Computer Security and Penetration Testing
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Security Weaknesses in Bluetooth by Markus Jakobsson and Susanne Wetzel Lucent Technologies – Bell Labs presented by Boris Kurktchiev.
Applied Cryptography for Network Security
Review on Networking Technologies Linda Wu (CMPT )
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Bluetooth Network Prepared By: Sara Ayad Aldehany.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
Wireless and Security CSCI 5857: Encoding and Encryption.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Chapter 4 Computer Networks – Part 1
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
6.1. Communication Methods Revision using Qwizdom.
1.1 System Performance Security Module 1 Version 5.
Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.
INTRODUCTION OVERVIEW OF OPERATION FREQUENCY HOPPING NETWORKING CONNECTION POWER CONSIDERATIONS CORE ARCHITECTURE RELIABILITY AND SECURITY ADVANTAGES.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
University of Virginia 1 Gregory LammGerlando Falauto Jorge EstradaJag Gadiyaram November 29, 2000 Identifying and Assessing Security Issues related to.
An Analysis of Bluetooth Security
Bluetooth Presented by Venkateshwar R Gotur CMPT
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Huda AL-Omair_ networks61 Wide Area Network. Huda AL-Omair_ networks62 What is a WAN? Wide area network or WAN is a computer network covering a wide geographical.
Chapter 21 Distributed System Security Copyright © 2008.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Fatma kalid al-makanji
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
SEMINAR ON BLUETOOTH TECHNOLOGY
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
An Analysis of Bluetooth Security Team A: Padmaja Sriraman Padmapriya Gudipati Sreenivasulu Lekkala.
Overview of the security weaknesses in Bluetooth Dave Singelée COSIC seminar 11/06/2003.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
WAN Transmission Media
Wireless Network Security CSIS 5857: Encoding and Encryption.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Technology By :-. What Is Bluetooth? Designed to be used to connect both mobile devices and peripherals that currently require a wire Short range wireless.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
ICT Unit 4: Network and the effects of using them
Introduction Of Bluetooth Presented By: Tanveer Ahmed, , CS 3 rd Year Vikas Shukla, , CS 3 rd Year.
Physical layer protocol bluetooth
BLUETOOTH TECHNOLOGY/SECURITY
BLUETOOTH TECHNOLOGY/SECURITY
“I don’t have to be careful, I’ve got a gun.”
PREPARED BY: RIDDHI PATEL (09CE085)
Presentation transcript:

Focus On Bluetooth Security Presented by Kanij Fatema Sharme

What Is Bluetooth? ☼ Bluetooth is an open standard for short-range digital radio to interconnect a variety of devices Cell phones, PDA, notebook computers, modems, cordless phones, pagers, laptop computers, printers, cameras by developing a single-chip, low-cost, radio-based wireless network technology

Bluetooth Bluetooth is a PAN Technology –Offers fast and reliable transmission for both voice and data –Can support either one asynchronous data channel with up to three simultaneous synchronous speech channels or one channel that transfers asynchronous data and synchronous speech simultaneously –Support both packet-switching and circuit- switching

Security of Bluetooth Security in Bluetooth is provided on the radio paths only –Link authentication and encryption may be provided –True end-to-end security relies on higher layer security solutions on top of Bluetooth Bluetooth provides three security services –Authentication – identity verification of communicating devices –Confidentiality – against information compromise –Authorization – access right of resources/services

Security Modes (Authentication ) Exchange Business Cards –Needs a secret key A security manager controls access to services and to devices –Security mode 2 does not provide any security until a channel has been established Key Generation from PIN –PIN: 1-16 bytes. PINs are fixed and may be permanently stored. Many users use the four digit 0000

Creation of a link key Authentication Challenge-Response Based –Claimant: intends to prove its identity, to be verified –Verifier: validating the identity of another device –Use challenge-response to verify whether the claimant knows the secret (link key) or not. If fail, the claimant must wait for an interval to try a new attempt. –The waiting time is increased exponentially to defend the “try-and-error” authentication attack –Mutual authentication is supported Challenge (128-bit) Response (32-bit) 48-bit device address

Bluetooth Security Architecture Step 1: User input (initialization or pairing) –Two devices need a common pin (1-16 bytes) Step 2: Authentication key (128-bit link key) generation –Possibly permanent, generated based on the PIN, device address, random numbers, etc. Step 3: Encryption key (128 bits, store temporarily) Step 4: key stream generation for xor-ing the payload

Hacker Tools Bluesnarfing: is the theft of information from a wireless device through a Bluetooth connection. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such as the user's calendar, contact list and and text messages -- without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled.

Most important security weaknesses Problems with E0 PIN Problems with E1 Location privacy Denial of service attacks

Location privacy Devices can be in discoverable mode Every device has fixed hardware address Addresses are sent in clear – possible to track devices (and users)

Denial of service attacks Radio jamming attacks Buffer overflow attacks Blocking of other devices Battery exhaustion (e.g., sleep deprivation torture attack)

Other weaknesses No integrity checks No prevention of replay attacks Man in the middle attacks Sometimes: default = no security

Advantages (+) Wireless (No Cables) No Setup Needed Low Power Consumption (1 Milliwat) Industry Wide Support

Disadvantages (-) Short range (10 meters) Small throughput rates - Data Rate 1.0 Mbps Mostly for personal use (PANs) Fairly Expensive

The End Thank You, for attending my presentation.