You are on page 1of 9

BLUETOOTH NETWORK SECURITY

TABLE OF CONTENT
 INTRODUCTION
 ABOUT BLUETOOTH
 BLUETOOTH NETWORKS
 BLUETOOTH ARCHITECTURE
 SECURITY ASPECTS IN BLUETOOTH
 CONNECTION ESTABLISHMENT
 USED SOFTWARE
A. FOR DISCOVERING DEVICES
B. FOR HACKING
 EFFECTIVENESS OF ATTACK
 CONCLUSION
BLUETOOTH HACKING THREATS & PREVENTIONS
INTRODUCTION

Wireless communication offer organizations and many benefits such as portability and
flexibility, increased productivity, and lower installation costs.

Wireless local area network (WLAN) devices, for instance, allow users to move their
laptops from place to place within their offices without the need for wires and without
losing network connectivity.

Ad hoc networks, such as those enabled by Bluetooth, allow users to:

 Data synchronization with networks system and application sharing between


devices.
 Eliminates cables for printers and other peripheral device connections.

Specific threats and vulnerabilities to wireless networks and handheld devices include
the following:

 All the vulnerabilities that exist in a conventional wired network apply to


wireless technologies.
 Malicious entities may gain unauthorized access to an agency’s computer
network through wireless connections, bypassing any firewall protections.
ABOUT BLUETOOTH
The original architecture for Bluetooth was developed by
Ericson Mobile Communication Co. Bluetooth was originally designed primarily as a
cable replacement protocol for wireless communications.

Among the array of devices that are anticipated are cellular phones, PDAs,
notebook computers, modemds, cordless phones, pagers, laptop computers, cameras,
PC cards, fax machines, and printers.

Now Bluetooth specifications:

 The 802.11 WLAN standards.


 Unlicensed 2.4 GHz-2.4835 GHz ISM (industrial, scientific, medical applications)
frequency band.
 Frequency-hopping spread-spectrum (FHSS) technology to solve interference
problems.
 Transmission speeds up to 1 Mbps.

Bluetooth Classes and Specifications


Class Range
Class 1 -100 M
Class 2 -10 M
Class 3 -1 M
BLUEOOTH NETWORKS
Bluetooth devices can form three types of networks:

 Point to Point Link


 Piconet Networks
 Ad-hoc or Scatternet Networks

Point to Point Link:


When two Bluetooth enabled devices share information or data
that is called point to point link.

Piconet Network:
When there is a collection of devices paired with each other, it forms a
small personal are a network called “Piconet”. A Piconet consists of a master and ata
most seven activeslaves.

Each Piconet has its own hopping sequence and the master and all slaves share the
same channel.
Ad-hoc or Scatternet Network:
Two or more piconets connected to each other by means of
a device (called “bridge”) participating in both the piconets, form a Scatternet Network.

The role of bridge is to transmit data across piconets.

When a number of Bluetooth devices communicate to each other in same vicinity,

There is a high level of interference. To combat interference, Bluetooth technology


applies a fast frequency-hopping scheme which hoops over 79 channels 1600 times per
second.

For devices to communicate to each other using Bluetooth they need to be paired with
each other to have synchronized frequency-hopping sequence.
BLUETOOTH ARCHITECTURE
The Bluetooth core system has three parts:

 RF transceiver
 Baseband
 Protocol-stack
SECURITY ASPECTS IN BLUETOOTH
The Bluetooth-system provide security at two level-

 At Link layer
 At Application layer

Link layer security

Four different entities are used for maintaining security at the link layer, a
Bluetooth device address, two secret keys and a pseudo-random number that shall be
regenerated for each new transaction.

The four entities and their sizes are summarized in table-

Entity Size
BD_ADDR 48 bits
Private user key, authentication 128 bits
Private user key, encryption 8-128 bits
Configurable length(byte-wise)
RAND 128 bits
Table 1.1:Entities used in authentication and encryption procedures

BREAKING INTO SECURITY

Bluetooth devices themselves have inherent security


vulnerabilities. For example, malicious users can use wireless microphones as bugging
devices. Although such attacks have not been documented because Bluetooth is not yet
commercially prevalent, incidents have been recorded of successful attacks on PCs
using programs such as Back Orifice and Netbus.

Attack Tools & Programs

 Hardware Used : Dell XPS,

You might also like