You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/268018259

Bluetooth Technology: Security Issues and Its Prevention

Article  in  International Journal of Computer Applications in Technology · October 2014

CITATIONS READS

16 32,228

2 authors, including:

Gypsy Nandi
Assam Don Bosco University
24 PUBLICATIONS   153 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

A Study on Knowledge-Based Online Sonial Network Analysis and Mining View project

All content following this page was uploaded by Gypsy Nandi on 09 November 2014.

The user has requested enhancement of the downloaded file.


ISSN:2229-6093

Vikethozo Tsira et al, Int.J.Computer Technology & Applications,Vol 5 (5),1833-1837

Bluetooth Technology: Security Issues and Its


Prevention
Vikethozo Tsira Gypsy Nandi
Department of Computer Science & Engineering and IT Department of Computer Science & Engineering and IT
Don Bosco College of Engineering and Technology Don Bosco College of Engineering and Technology
Assam Don Bosco University Assam Don Bosco University
Guwahati, Assam-781017, India Guwahati, Assam-781017, India
thozoangami@gmail.com gypsy.nandi@dbuniversity.ac.in

Abstract— Bluetooth is primarily used for establishing Bluetooth devices are low-power and have a range of
wireless Personal Area Networks (PANs) communication. It 10m distance from the device. Today Bluetooth
is a popular and commonly used technology for sending technology is the implementation of the protocol defined
data from one device to another device. It allows the user to by the IEEE 802.15 standard. The standard defines a
form ad hoc networks to transfer data among wide variety
of devices. The current data transfer rate for a Bluetooth is
wireless PAN (Personal Area Network) operable in an
1 mbps. However, as Bluetooth technology is becoming area of the size of a room or a hall. It is a protocol of
widespread, vulnerabilities in its security are increasing choice to connect two or more devices that are not in
which can be very dangerous to the users’ personal direct line of sight to each other. A security association
information. Preventing such unauthorized access from between two devices can be connected manually by
secure communication plays a vital role to the pairing pairing i.e. the user entered common PIN (Personal
devices. This paper presents the malicious intervention Identification Number) number to each of the devices.
about the attacks on the devices while connecting with other When two devices attempt to connect, unique key is
devices during the exchange of data using Bluetooth generated based on the PIN number entered on both the
technology. It also discusses various security measures that
devices.
can be involved during data exchange using Bluetooth
technology. Attacks like Bluesnarf retrieve personal data from
the devices with flawed implementation of access
Keywords: Bluetooth Security, pairing, malicious attackers, control. Whenever a device tries to attempt to connect to
network security and Man-in-the-middle attack (MIM) another device, a Bluetooth user has the ability to choose
if he/she wants to connect or not. However, Bluetooth
devices are prone to attacks such as battery exhaustion,
I. INTRODUCTION man in the middle, denial of service, and unauthorized
Bluetooth was designed as a cable replacement device control and data access [3]. Experts have warned
technology. It is a short range radio link designed to that unless higher security protection is delivered, all
connect portable and/or fixed electronic devices. The transmission of sensitive data over Bluetooth would be
effective range, to date, is thirty feet or ten meters. It is a unwise.
combination of software and hardware technology. The
hardware is riding on a radio chip. On the other hand, the
main control and security protocols have been II. PROTOCOL STACKS OF BLUETOOTH
implemented in the software. By using both hardware and A protocol stack is a combination of software/hardware
software Bluetooth has become a smart technology for implementation of the actual protocols specified in the
efficient and flexible wireless communication system. standard. It also defines how the devices should
The Bluetooth SIG (Special Interest Group) has
communicate with each other based on the standard. The
developed to reduce the cost of implementation and
speed up its adoption for various applications. The Bluetooth protocol stack is shown in Figure 1. Each
Bluetooth specifications provide for three basic security component of the Bluetooth stack is explained below.
services: - • Bluetooth Radio: specifics details of the air
• Authentication: verifying the identity of interface, including frequency, frequency hopping,
communicating devices based on their Bluetooth modulation scheme, and transmission power.
device address. Bluetooth does not provide native • Baseband: concerned with connection establishment
user authentication. within a piconet, addressing, packet format, timing
• Confidentiality: protecting information from and power control.
eavesdropping by ensuring that only authorized • Link manager protocol (LMP): establishes the link
devices can access and view transmitted data. setup between Bluetooth devices and manages
• Authorization: allowing the control of resources by ongoing links, including security aspects (e.g.
ensuring that a device is authorized to use a service authentication and encryption), and control and
before permitting it to do so. negotiation of baseband packet size.

IJCTA | Sept-Oct 2014 1833


Available online@www.ijcta.com
ISSN:2229-6093

Vikethozo Tsira et al, Int.J.Computer Technology & Applications,Vol 5 (5),1833-1837

• Using the ON/OFF feature for Bluetooth connection


Enable Bluetooth functionality only when necessary.
It is advisable to off the connection once the transfer
of data through Bluetooth connection is over.

• Shorter range of Bluetooth connections


Keep devices as close together as possible when
Bluetooth links are active. Pair Bluetooth devices in
a secure area using long, randomly generated
passkeys.

Fig 1: Bluetooth Protocol Stack [6] IV. PICONETS AND SCATTERNETS


The basic unit of Bluetooth networking is a piconet. The
• Logical link control and adaptation protocol terms „piconet‟ and „scatternet‟ are typically applied to
(L2CAP): adapts upper layer protocols to the Bluetooth wireless technology. A brief description of
baseband layer. Provides both connectionless and each of the two terminologies is given below:
connection-oriented services. • Piconet - It is a Bluetooth network that can have up
• Service discovery protocol (SDP): handles device to eight stations, one of which is called as master and
information, services, and queries for service the rest are called as slaves as shown in Figure 2.
characteristics between two or more Bluetooth
devices.
• Host Controller Interface (HCI): provides an
interface method for accessing the Bluetooth
hardware capabilities. It contains a command
interface, which acts between the Baseband
controller and link manager
• TCS BIN (Telephony Control Service): bit-
oriented protocol that defines the call control
signaling for the establishment of voice and data
calls between Bluetooth devices.
• OBEX(OBject EXchange) : Session-layer protocol
for the exchange of objects, providing a model for Fig 2: Piconet [5]
object and operation representation
• RFCOMM: a reliable transport protocol, which • Scatternet - It is computer network comprising of
provides emulation of RS232 serial ports over the two or more piconets as shown in Figure 3. A
L2CAP protocol scatternet has the advantage of supporting
• WAE/WAP: Bluetooth incorporates the wireless communication between more than eight devices.
application environment and the wireless application However, currently there are only few
protocol into its architecture. implementations of scatternets and various
researches are being done related to it.

III. CONFIDENTIALITY OF DATA ON THE


DEVICES
The purpose of maintaining confidentiality of data
exchanged from Bluetooth devices is for creating and
maintaining an environment that safeguards data threats
in personal devices. It is also designed to establish
processes for ensuring the security of confidential
information and to establish administrative, technical,
and physical safeguards to protect against unauthorized
access or use of this information. To ensure
confidentiality of data, the following mechanisms are
followed:
• User authentication Fig 3: Scatternet [5]
Use of individual password should not be sharable.
The objective of the password is to ensure that only
the users gains access to device data and
functionality. Wireless security policies should
mandate the use of private passwords.

IJCTA | Sept-Oct 2014 1834


Available online@www.ijcta.com
ISSN:2229-6093

Vikethozo Tsira et al, Int.J.Computer Technology & Applications,Vol 5 (5),1833-1837

V. WHAT ARE THE BLUETOOTH SECURITY • Fuzzing Attacks:


ISSUES? It consists of sending malformed or otherwise non-
standard data to a device‟s Bluetooth radio and
Bluetooth offers several benefits and advantages, observing how the device reacts. When a device‟s
but the benefits are not provided without risk. It includes response is slowed or stopped by these attacks, this
authorisation, authentication and optional encryption. indicates that a serious vulnerability potentially
Authentication is the proving of identity of one exists in the protocol stack [5].
Bluetooth-enabled device to another. Authorisation is the
granting or denying of Bluetooth connection access to • Reflection attack:
resources or services from the requesting device. An attacker does not have to know any secret
Encryption is the translating of data into secret code so information, because the attacker only relays
that eavesdroppers cannot read its content. (reflects) the received information from one target
Despite all the defence mechanisms in place, usage device to another during the authentication [1].
of Bluetooth might result in exploits and data loss from
the device through the following methods:- • Backdoor attack:
Attacker may continue using the devices for
• MAC spoofing attack:
extracting the data without the consent from the
Malicious attackers can perform MAC spoofing
owner until the user notices such attacks.
during the link key generation while Piconet is being
formed. Bluetooth SIG did not provide a good
• Denial of Service:
solution to prevent this type of attack. They only
Malicious attackers can damage your devices, block
advised the users to do the pairing process in private
them from receiving phone calls and drain your
settings. They also suggested that a long, random,
battery. Switch off the Bluetooth if not necessary.
and variable PIN numbers should be used [6].
• Man-in-the-Middle/Impersonation Attack:
• Cabir Worm:
A Man-in-the-Middle attack involves relaying of
It is a kind of malicious software that uses Bluetooth
authentication message unknowingly between two
technology to seek out available Bluetooth devices
devices in order to authenticate without knowing the
and sends itself to them. The Cabir worm shows that
shared secret keys. Actually involve the modification
it is achievable to write mobile viruses that spread
of data between the pairing devices communicating
via Bluetooth and may cause other hackers to
in a Piconet [6].
explore the possibilities of writing Bluetooth
viruses[1].
• War Nibbling:
War Nibbling is an attack in which a phreaker
• BlueJacking attack:
attempts to find and access as many vulnerable
This attack is initiated by an attacker sending
Bluetooth phones as possible. They typically use
unsolicited messages to a user of a Bluetooth-
laptops or PCs with high gain antennas and special
enabled device. Does not allow any adversary access
software, such asRedfang, to sniff for accessible
to any data.
phones.
• BlueSnarfing attack:
• Eavesdropping:
In this case, attackers can access the data without the
It is all about wireless communications. Just like
consent from the owner.
with Wi-Fi, Bluetooth encryption is supposed to stop
criminals listening in to your data.
• BlueBugging attack:
Attacker can remotely change the data without the
permission from the users. VI. SECURITY FEATURES AND MODES
The various versions of Bluetooth specifications define
• Blueprinting attack:
four security modes. Each version of Bluetooth supports
An attacker can use Blueprinting to generate
some, but not all, of the four modes. Each Bluetooth
statistics about Bluetooth device manufacturers and
device must operate in one of the four modes, which are
models, and to find out whether there are devices in
described below:-
the range of vulnerability that have issued with
• Security Mode 1
Bluetooth security [1].
It is non-secure. In effect, Bluetooth devices in this
mode is “Promiscuous” and do not employ any
• Blueover attack:
mechanisms to prevent other Bluetooth-enabled from
A Blueover attack is dangerous only if the target
establishing connections.
device is vulnerable to BlueBugging. BlueBugging
attack is capable of stealing sensitive information
• Security Mode 2
from your friend. A Blueover attack can be done
The centralized security manager maintains policies
secretly, by using only a Bluetooth mobile phone
for access control and interfaces with other protocols
with Blueover or Bluover II installed.

IJCTA | Sept-Oct 2014 1835


Available online@www.ijcta.com
ISSN:2229-6093

Vikethozo Tsira et al, Int.J.Computer Technology & Applications,Vol 5 (5),1833-1837

and device users. All Bluetooth devices can support VII. RISK MITIGATION AND COUNTER MEASURE
Security mode 2. Risk mitigation can be achieved in Bluetooth
systems by applying countermeasures to address specific
• Security Mode 3 threats and vulnerabilities. Organizations should applying
A Bluetooth device initiates security procedures countermeasures to address specific threats and
before the physical link is fully established. vulnerabilities to Bluetooth network. First solution is to
Bluetooth devices operating in Security Mode 3 provide an adequate level of knowledge and
mandates authentication and encryption for all understanding for those who will deal with Bluetooth-
connections to and from the device. This mode enabled devices. Organizations using Bluetooth
supports authentication (unidirectional or mutual) technology should design and document security policies
and encryption [7]. To generate this key, a pairing that address the use of Bluetooth-enabled devices and
procedure is used when the two devices communicate users‟ responsibilities. Organizations should also include
for the first time. The link key is generated during an awareness-based education to support staff to enhance
initialization phase, while two Bluetooth devices that their understanding and knowledge of Bluetooth.
are communicating are “associated”. Per the Bluetooth security checklist with guidelines and
Bluetooth specification, two associated devices recommendations for creating and maintaining secure
simultaneously derive link keys during the Bluetooth piconets:-
initialization phase when a user enters an identical • Need to develop an organizational wireless security
PIN into both devices. The PIN entry, device policy that addresses Bluetooth technology.
association, and key derivation are depicted • Need to ensure that Bluetooth users on the network
conceptually in Figure 4. After initialization is are made aware of their security-related
complete, devices automatically and transparently responsibilities regarding Bluetooth use.
authenticate and perform encryption of the link. It is • Comprehensive security assessments at regular
possible to create a link key using higher layer key intervals to fully understand the organization
exchange methods and then import the link key into Bluetooth security posture.
the Bluetooth modules. The PIN code used in • Need to ensure that wireless devices and networks
Bluetooth devices can vary between 1 and 16 bytes. involving Bluetooth technology are fully understood
The typical 4-digit PIN may be sufficient for some from an architecture perspective and documented
applications; however, longer codes may be accordingly.
necessary [7]. • Users should be provided with a list of precautionary
measures they should take to better protect handheld
Bluetooth devices from theft.
• Change the default setting of the Bluetooth device to
reflect the organization‟s security policy.
• Bluetooth devices should be set to the lowest
necessary and sufficient power level so that
transmissions remain within the secure perimeter of
the organization.
• Choose PIN codes that are sufficiently random and
long. Avoid static PINs, such as all zeroes.
• If Bluetooth devices is lost or stolen, users should
immediately unpaired the missing device from all
other Bluetooth devices with which it was previously
paired.
Figure 4: Bluetooth Generation Key from PIN [7] • Need to install antivirus software on Bluetooth-
enabled hosts that are frequently targeted by
malware.
• Security Mode 4
• Need to fully test and deploy Bluetooth software
This mode is similar to Security mode 2. Security
patches and upgrades regularly.
mode 4 is a service level enforced security mode in
• Users should not accept transmissions of any kind
which security procedures are initiated after link
from unknown or suspicious devices. These types of
setup. Secure Simple Pairing uses Elliptic Curve
transmission include message, files, and images.
Diffie Hellman (ECDH) techniques for key exchange
and link key generation. Security requirements for
services protected by Security Mode 4 must be
VIII. PREVENTIVE MEASURE FOR BLUETOOTH
classified as one of the following: authenticated link
key required, unauthenticated link key required, or USAGE
no security required. Bluetooth Technology has many security vulnerabilities
in its various configurations. Let us talk about how we
can secure ourselves in spite of these vulnerabilities in
Bluetooth:-

IJCTA | Sept-Oct 2014 1836


Available online@www.ijcta.com
ISSN:2229-6093

Vikethozo Tsira et al, Int.J.Computer Technology & Applications,Vol 5 (5),1833-1837

• The „discoverable‟ mode on your device is only REFERENCES


meant to be used to “pair” two Bluetooth-enabled
devices. When the pairing process is done, the
[1] Nateq Be-Nazir Ibn Minar and Mohammed Tarique,“Bluetooth
„discoverable‟ mode can be turned off as the devices Security Threats and Solution” A Survey. In International Journal
should remember each other. of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January
• Refrain from communicating or transmitting 2012
sensitive and personal information using the [2] Dieter Gollmann., “Computer security”, 2nd Edition, paperback
January 1,2007.
Bluetooth-enabled device as it might be sniffed. [3] Satwant Kaur First Lady of Emerging Technologies Silicon
• Use strong passkey that is randomly generated when Valley, USA,2014.
pairing Bluetooth devices and never enter passkeys [4] Tarun Kumar, ”Improving pairing mechanism in Bluetooth
when unexpectedly prompted for them. security” International Journal of Recent Trends in Engineering,
• Maintain physical control of devices at all times. Vol 2, No. 2, November 2009
[5] Karen Scarfone and john Padgette, “Guide to Bluetooth Security”,
Remove lost or stolen devices from paired device paperback June 30,2012.
lists. [6] Trishna Panse and Prashant Panse, “A Survey on Security Threats
• Avoid accepting attachments or applications and Vulnerability attacks on Bluetooth Communication” ISSN:
received on your phone or device if you were not 0975-9646.
expecting it no matter how legitimate it may be. If [7] Praveen kumar mishra, “Bluetooth Security Threats.”
your device asks to pair and you didn't initiate the International Journal of Computer Science & Engineering
pairing, deny it and check that your 'discoverable' Technology (IJCSET)
setting is set to „off‟ or „hidden‟. [8] Tzu-Chang Yeh, Jian-Ren Peng, Sheng-Shih Wang, and Jun-Ping
Hsu, “Securing Bluetooth communication” International Journal
of Network Security, Vol.14, No.4, PP.229-235, July 2012.
IX. CONCLUSION
This paper discusses about the unique way of
utilizing this amazing Bluetooth technology to achieve
efficient ways of communication. It also covers up
various important topics such as some background
information related to the Bluetooth system, its
applications and various security issues involved in
Bluetooth. Vulnerabilities in Bluetooth technologies and
threats against those vulnerabilities are also discussed.
Bluetooth security specialists need to provide automatic
updates to its security protocols and user privacy
protection methods for every new security breach so that
protection of the device user‟s personal information
becomes the primary objective. The latest improvements
and innovations related to Bluetooth technology will be
studied for our future work.

IJCTA | Sept-Oct 2014 1837


Available online@www.ijcta.com
View publication stats

You might also like