Professional Documents
Culture Documents
Security in Wireless Personal Area Networks: Bluetooth
Security in Wireless Personal Area Networks: Bluetooth
Area Networks
Bluetooth
Terms
Non-Secure
Service-level enforced security
Link-Level Enforced Security
Security Mechanisms
Initialization Key
Used during installation, requires PIN
Unit Key
After device is installed, stored in non-volatile memory
Combination Key
Between every pair of devices communicating with each other
Master Key
When master wants to transmit to multiple devices at once
Initialization Key
Temporary key
Master device generates it with 2 random 128-bit numbers
Random number is sent to the slaves, which use it & initialization key to generate overlay
Master key is XORed with overlay by the master & sent to the slaves, which extract master
key
Done for each slave
Bluetooth Encryption
Three modes
First Mode: nothing is encrypted
Second Mode: Broadcast traffic is not encrypted
Third Mode: all traffic is encrypted
Authentication
Unit A wants to verify unit B identity:
A sends a challenge to B
B encrypts the challenge & sends back a response
A also encrypts the challenge & compares it with the response received from B
Challenge is a random number, which is input to encryption algorithm E1
Algorithm takes two other inputs:
Bluetooth address of Claimant(Unit B)
Link-Layer Key
Algorithm E1 produces ACO(Authenticated Ciphering Offset),used as encryption
key if authentication is successful
Limitations & Problems