Professional Documents
Culture Documents
TABLE OF CONTENT
INTRODUCTION
ABOUT BLUETOOTH
BLUETOOTH NETWORKS
BLUETOOTH ARCHITECTURE
SECURITY ASPECTS IN BLUETOOTH
CONNECTION ESTABLISHMENT
USED SOFTWARE
A. FOR DISCOVERING DEVICES
B. FOR HACKING
EFFECTIVENESS OF ATTACK
CONCLUSION
BLUETOOTH HACKING THREATS & PREVENTIONS
INTRODUCTION
Wireless communication offer organizations and many benefits such as portability and
flexibility, increased productivity, and lower installation costs.
Wireless local area network (WLAN) devices, for instance, allow users to move their
laptops from place to place within their offices without the need for wires and without
losing network connectivity.
Specific threats and vulnerabilities to wireless networks and handheld devices include
the following:
Among the array of devices that are anticipated are cellular phones, PDAs,
notebook computers, modemds, cordless phones, pagers, laptop computers, cameras,
PC cards, fax machines, and printers.
Piconet Network:
When there is a collection of devices paired with each other, it forms a
small personal are a network called “Piconet”. A Piconet consists of a master and ata
most seven activeslaves.
Each Piconet has its own hopping sequence and the master and all slaves share the
same channel.
Ad-hoc or Scatternet Network:
Two or more piconets connected to each other by means of
a device (called “bridge”) participating in both the piconets, form a Scatternet Network.
For devices to communicate to each other using Bluetooth they need to be paired with
each other to have synchronized frequency-hopping sequence.
BLUETOOTH ARCHITECTURE
The Bluetooth core system has three parts:
RF transceiver
Baseband
Protocol-stack
SECURITY ASPECTS IN BLUETOOTH
The Bluetooth-system provide security at two level-
At Link layer
At Application layer
Four different entities are used for maintaining security at the link layer, a
Bluetooth device address, two secret keys and a pseudo-random number that shall be
regenerated for each new transaction.
Entity Size
BD_ADDR 48 bits
Private user key, authentication 128 bits
Private user key, encryption 8-128 bits
Configurable length(byte-wise)
RAND 128 bits
Table 1.1:Entities used in authentication and encryption procedures