SlideShare una empresa de Scribd logo
1 de 31
BY
AJAL.A.J
ASSISTANT PROFESSOR
METS SCHOOL OF ENGINEERING , MALA
BLUETOOTH SECURITY USING
KEY - GENERATING ENCRYPTION ALGOTITHM
Sources for talk
• Palm Source Presentation by Peter Easton
205 Bluetooth and Palm OS®
http://www.palmsource.com/slides/Track%20200/205.pdf
• Palm’s Bluetooth Wireless Technology Page
http://www.palmos.com/dev/tech/bluetooth/
• Palm’s Bluetooth Whitepaper
http://www.palmos.com/dev/tech/bluetooth/palm_b
• AnywhereYouGo.com
http://www.anywhereyougo.com/
ABSTRACT
• Bluetooth is a way of connecting machines to each other without
cables or any other physical medium.
• It uses radio waves to transfer information, so it is very
susceptible to attacks.
• This paper first gives some background information about
Bluetooth system and security issues in ad hoc networks, then it
concentrates on specific security measures in Bluetooth, mainly
authentication, encryption, key management and ad hoc aspects.
• Then it points out flaws and possible security holes in the
Bluetooth Security Specification
Origin of the name and the logo
• Bluetooth was named after a late tenth century king, Harald Bluetooth,
King of Denmark and Norway. He is known for his unification of
previously warring tribes from Denmark (including now Swedish
Scania, where the Bluetooth technology was invented), and Norway.
Bluetooth likewise was intended to unify different technologies, such
as personal computers and mobile phones.The name may have been
inspired less by the historical Harald than the loose interpretation of
him in The Long Ships by Frans Gunnar Bengtsson, a Swedish Viking-
inspired novel.
• The Bluetooth logo merges the Germanic runes analogous to the
modern Latin letter H and B: (for Harald Bluetooth)
(Hagall)
and
(Berkanan)
• merged together, forming a bind rune.
What is Bluetooth?
• Open wireless communication standard
– www.bluetooth.com
• Focused on mobile wireless links
– Small, low cost, low power consumption
• Allows small ad hoc wireless networks
– Piconet
• 1 master and up to 7 active slaves
– Scatternet
• Communication between Piconets
What is Bluetooth?
• 2.4 GHz Open band
– Globally available
– Other devices include microwave ovens, cordless
phones
– Frequency hopping and Time Division Multiplexing
• 10 – 100 meter range
– Up to 8 active devices can be in the same piconet
Related Standards
• IrDA: Infrared Data Association
– Infrared “beaming”
– Short distances (~1 meters)
– Point-to-point, line-of-sight communication
• 802.11B and Home RF
– Higher bandwidth
– Don’t support voice
– More expensive
– Require more power
Bluetooth versionsBluetooth versions
 Bluetooth 1.0 and 1.0B
 Versions 1.0 and 1.0B had many problems
 Manufacturers had difficulty making their products interoperable.
 Bluetooth 1.1
 Many errors found in the 1.0B specifications were fixed.
 Added support for non-encrypted channels.
 Received Signal Strength Indicator (RSSI).
 Bluetooth 1.2
 Faster Connection and Discovery
 Use the Adaptive frequency-hopping spread spectrum (AFH)
 improves resistance to radio frequency interference
 Higher transmission speeds in practice, up to 721 kbps
 Bluetooth 2.0
 This version, specified November 2004
 The main enhancement is the introduction of an enhanced data rate (EDR) of 3.0 Mbps.
 Lower power consumption through a reduced duty cycle.
 Simplification of multi-link scenarios due to more available bandwidth.
 Bluetooth 2.1
 A draft version of the Bluetooth Core Specification Version 2.1 + EDR is now available
Bluetooth System Components
• Link Manager:
- Link Layer messages for setup and link control
Base band :
- base band protocols and low level link routines
• Radio unit :
– actual radio transceiver which enables the
wireless link between Bluetooth devices
Overview of Bluetooth hardware
Bluetooth Security
1. non-secure
– device does not initiate any kind of security procedure
2. service-level security
– more flexibility in application access policies is allowed
3. link level security
– device sets up security procedures before the link set-
up is completed.
– Link level security provides applications with
knowledge of "who" is at the other end of the link and
provide authentication, authorization, and encryption
services
Typical Bluetooth Operation
• Discover single or multiple devices
• Create an link to the device
• Create a socket
– SDP: Service Discovery Protocol
– Used by Virtual Serial Driver
– Data Connection
• Pass Data
• Close Socket, close link
Key Management
Key generating algorithm E22 for
master and initialization keys
Encryption process
Encryption key generation
Bluetooth Encryption
E0
BD_ADDRA
clockA
KC’
Kcipher
Kcipher
Kcipher
dataA-B
dataB-A
E0
BD_ADDRA
clockA
K’C’
K’cipher
K’cipher
K’cipher
dataA-B
dataB-A
data
A B
Authentication
Problems in the Security of
Bluetooth
• Radio jamming attacks
• Buffer overflow attacks
• Blocking of other devices
• Battery exhaustion
• Man in the middle attacks
• Sometimes: default = no security
• possible to track devices (and users)
Recommendations
• Never use unit keys!!!!
• Use long and sufficiently random PINs
• Always make sure security is turned ‘on’
Bluetooth™ Wireless
Technology Application Areas
• Pure computing
applications
– Presentations
– Card Scanning
– Synchronizing Data
– Remote Synchronization
– Printing
– Scanners
• Ubiquous Applications
– Communicator platforms
– Electronic Books
– Travel
– Home Entertainment
• System Applications
– In-vehicle systems
– Payment Systems
– Behavior Enforcement
– Collaboration
– Mobile E-commerce
802.15 Wireless Personal Area802.15 Wireless Personal Area
Network(WPAN) Working GroupNetwork(WPAN) Working Group
 Working Groups summary
802.15
802.15.1 802.15.2
802.15.4b802.15.3a 802.15.3b
802.15.4802.15.3
 802.15.1 : WPAN/Bluetooth
 802.15.2 : Coexistence Group
 802.15.3 : High Rate(HR) WPAN Group
 802.15.3a : UWB
 802.15.3b : MAC Amendment Task Group
 802.15.4 : Low Rate(LW) WPAN Group(Zigbee)
 802.15.4a : WPAN Low Rate Alternative PHY
 802.15.4b : Revisions and Enhancements
 UWB Forum
802.15.4a
Ultra Wide Band (UWB)Ultra Wide Band (UWB)
 What is the UWB?
 Transmitting information spread over a large bandwidth (>500 MHz)
 Provide an efficient use of scarce radio bandwidth
 High data rate in WPAN connectivity and longer-range
 A February 14, 2002
 Report and Order by the FCC authorizes the unlicensed use of UWB
 November of 2005.
 ITU-R have resulted in a Report and Recommendation on UWB
 Expected to act on national regulations for UWB very soon.
 The advantage of the UWB
 Take advantage of inverse relationship between distance and throughput
 Huge bandwidth : very high throughput
 Low power consumption
 Convenience and flexibility
 No interference
Ultra Wide Band(UWB)(2/2)Ultra Wide Band(UWB)(2/2)
Wireless
technology
Power mW Rage meter BW/channel Rate bps
CDMA
1xEVDO
600 ~2000 1.25 MHz 2.4M
802.16(WiMAX
)
250 ~4000 25MHz 120M
802.11g(WiFi) 50 ~100 25MHz 54M
Bluetooth 1 ~10 1MHz <1M
UWB <30 10~30 500MHz 100M~1G
 Current wireless Comparison
 Key application
 Wireless USB
 Toys and game
 Consumer electronics
 Location tracking
 Handset
802.16 Broadband Wireless Access(BWA)802.16 Broadband Wireless Access(BWA)
Working Group(1/2)Working Group(1/2)
 IEEE 802.16
 Be was established by IEEE Standards Board in 1999, aims to
prepare formal specifications for the global deployment of
broadband Wireless Metropolitan Area Network.
 A unit of the IEEE 802 LAN/MAN Standards Committee.
 A related technology Mobile Broadband Wireless Access(MBWA)
Fixed
(Stationary)
Pedestrian
(Nomadic)
Mobile
(Vehicular)
2G/2.5G
Cellular
0.1 1.0 10 100
Peak Data Rate per User (Mbits/second)
Mobility
802.16e
802.16a
(WiMAX)
WWAN
(IMT-2000)
cdma2000®
1xEV-DO,
cdma2000®
1xEV-DV
3.1
WCDMA HSDPA
802.15.1
(Bluetooth)
802.11
(WLAN)
802.15.3a
(UWB)
802.16 Broadband Wireless Access(BWA)802.16 Broadband Wireless Access(BWA)
Working Group(2/2)Working Group(2/2)
 Working Groups summary
802.16
802.15.g 802.15.h 802.15.k802.15.j802.16.f 802.15.m802.15.i
 802.16f : Management Information Base
 802.16g : Management Plane Procedures and Services
 802.16h : Improved Coexistence Mechanisms for License-Exempt Operation
 802.16i : Mobile Management Information Base
 802.16j : Multihop Relay Specification
 802.16k : Bridging of 802.16
 802.16m : Advanced Air Interface. Data rates of 100 Mbps for mobile
applications and 1 Gbps for fixed applications.
“Last Mile” Access Alternatives
Blue-
tooth
Blue-
tooth
Broadband Capable Terrestrial Wireless NetworksBroadband Capable Terrestrial Wireless Networks
UWB
802.1
5
UWB
802.1
5
Personal
Area
Networks
(PANs)
Range50 feet 500 feet 10’s miles
Metropolitan
Area
Networks
(MANs)
WLAN
802.1
1
WLAN
802.1
1
Local
Area
Networks
(LANs)
Wide
Area
Networks
(WANs)
Cellular
2.5 G,
3G
Cellular
2.5 G,
3G
Edge, CDMA2000,
1xEV-DO, UMTS
MMDS
LMDS
WMAN
(802.16d)
WMAN
(802.16e)
Mobile WiMAX
Final Thoughts
• A single-chip solution is the ultimate goal
– Around $5/chip
– Several players have begun developing implementations
• Success of device depends on
– The supplier’s ability to deliver implementation at a low
price point
– Application development that is easily integrated with
today’s infrastructure
– Ability of Bluetooth to meet market’s expectations
REFERENCES
• [1]Amoroso E., Fundamentals of Computer Security Technology, Prentice Hall,
2004.
• [2]Asokan N. & Ginzboorg P., Key Agreement in Ad-Hoc Networks, Prentice Hall,
2002
• [3]Bluetooth, The Bluetooth Specification, v.1.0B
< http://www.bluetooth.com/developer/specification/specification.asp >
• [4]Zhou L. & Haas Z., Securing Ad Hoc Networks
< http://www.ee.cornell.edu/~haas/Publications/network99.ps >
• [5]Gollmann D., Computer Security, John Wiley & Sons Inc., 2003.
• [6]Müller T., Bluetooth Security Architecture, 1999
< http://www.bluetooth.com/developer/download/download.asp?doc=174 >
BLUETOOTH TECHNOLOGY

Más contenido relacionado

La actualidad más candente

Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
Siva Pradeep Bolisetti
 
Wireless Communication
Wireless CommunicationWireless Communication
Wireless Communication
Awais Alam
 

La actualidad más candente (20)

Latest wireless technology
Latest wireless technologyLatest wireless technology
Latest wireless technology
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Types of wireless communication technologies
Types of wireless communication technologiesTypes of wireless communication technologies
Types of wireless communication technologies
 
5G PPT
5G PPT5G PPT
5G PPT
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
5G
5G5G
5G
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
Wireless Communication
Wireless CommunicationWireless Communication
Wireless Communication
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
5 G MOBILE TECHNOLOGY PPT1
5 G MOBILE TECHNOLOGY PPT15 G MOBILE TECHNOLOGY PPT1
5 G MOBILE TECHNOLOGY PPT1
 
Zig Bee
Zig BeeZig Bee
Zig Bee
 
The 5th generation (5G)
The 5th generation (5G)The 5th generation (5G)
The 5th generation (5G)
 
5g technology
5g technology5g technology
5g technology
 
5g wireless
5g wireless5g wireless
5g wireless
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Broadband technology wired and wireless
Broadband technology wired and wireless Broadband technology wired and wireless
Broadband technology wired and wireless
 
Wireless Personal Area Network(WPAN)
Wireless Personal Area Network(WPAN)Wireless Personal Area Network(WPAN)
Wireless Personal Area Network(WPAN)
 

Destacado (8)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technology
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 

Similar a BLUETOOTH TECHNOLOGY

R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
Saurav Kumar
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUN
Arun Franco
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
Arunabh Mishra
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
eceb9198
 

Similar a BLUETOOTH TECHNOLOGY (20)

R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUN
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
A Study Of Wireless Network Security
A Study Of Wireless Network SecurityA Study Of Wireless Network Security
A Study Of Wireless Network Security
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Wireless
WirelessWireless
Wireless
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
BT_Wifi_NFC.pdf
BT_Wifi_NFC.pdfBT_Wifi_NFC.pdf
BT_Wifi_NFC.pdf
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth.pptx
Bluetooth.pptxBluetooth.pptx
Bluetooth.pptx
 
BT WIFI NFC.pptx
BT WIFI NFC.pptxBT WIFI NFC.pptx
BT WIFI NFC.pptx
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
WiFi & Bluetooth by TAS
WiFi & Bluetooth by TASWiFi & Bluetooth by TAS
WiFi & Bluetooth by TAS
 

Más de AJAL A J

Más de AJAL A J (20)

KEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAMKEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAM
 
Paleontology Career
Paleontology  CareerPaleontology  Career
Paleontology Career
 
CHEMISTRY basic concepts of chemistry
CHEMISTRY  basic concepts of chemistryCHEMISTRY  basic concepts of chemistry
CHEMISTRY basic concepts of chemistry
 
Ecology
EcologyEcology
Ecology
 
Biogeochemical cycles
Biogeochemical cyclesBiogeochemical cycles
Biogeochemical cycles
 
ac dc bridges
ac dc bridgesac dc bridges
ac dc bridges
 
Hays bridge schering bridge wien bridge
Hays bridge  schering bridge  wien bridgeHays bridge  schering bridge  wien bridge
Hays bridge schering bridge wien bridge
 
App Naming Tip
App Naming TipApp Naming Tip
App Naming Tip
 
flora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and keralaflora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and kerala
 
B.Sc Cardiovascular Technology(CVT)
 B.Sc Cardiovascular Technology(CVT)  B.Sc Cardiovascular Technology(CVT)
B.Sc Cardiovascular Technology(CVT)
 
11 business strategies to make profit
11 business strategies to make profit 11 business strategies to make profit
11 business strategies to make profit
 
PCOS Polycystic Ovary Syndrome
PCOS  Polycystic Ovary SyndromePCOS  Polycystic Ovary Syndrome
PCOS Polycystic Ovary Syndrome
 
Courses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in HumanitiesCourses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in Humanities
 
MANAGEMENT Stories
 MANAGEMENT Stories MANAGEMENT Stories
MANAGEMENT Stories
 
NEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGYNEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGY
 
REVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTUREREVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTURE
 
NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S
 
Subjects to study if you want to work for a charity
Subjects to study if you want to work for a charitySubjects to study if you want to work for a charity
Subjects to study if you want to work for a charity
 
IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE
 
Clat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILSClat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILS
 

Último

CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
amitlee9823
 
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men 🔝kakinada🔝 Escor...
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men  🔝kakinada🔝   Escor...➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men  🔝kakinada🔝   Escor...
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men 🔝kakinada🔝 Escor...
amitlee9823
 
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Naicy mandal
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
wpkuukw
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
motiram463
 
CHEAP Call Girls in Hauz Quazi (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Hauz Quazi  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Hauz Quazi  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Hauz Quazi (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
tufbav
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsDeira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
 
Top Rated Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
 
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men 🔝kakinada🔝 Escor...
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men  🔝kakinada🔝   Escor...➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men  🔝kakinada🔝   Escor...
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men 🔝kakinada🔝 Escor...
 
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
 
SM-N975F esquematico completo - reparación.pdf
SM-N975F esquematico completo - reparación.pdfSM-N975F esquematico completo - reparación.pdf
SM-N975F esquematico completo - reparación.pdf
 
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
 
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
 
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
 
CHEAP Call Girls in Hauz Quazi (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Hauz Quazi  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Hauz Quazi  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Hauz Quazi (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
 
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
 

BLUETOOTH TECHNOLOGY

  • 1. BY AJAL.A.J ASSISTANT PROFESSOR METS SCHOOL OF ENGINEERING , MALA BLUETOOTH SECURITY USING KEY - GENERATING ENCRYPTION ALGOTITHM
  • 2. Sources for talk • Palm Source Presentation by Peter Easton 205 Bluetooth and Palm OS® http://www.palmsource.com/slides/Track%20200/205.pdf • Palm’s Bluetooth Wireless Technology Page http://www.palmos.com/dev/tech/bluetooth/ • Palm’s Bluetooth Whitepaper http://www.palmos.com/dev/tech/bluetooth/palm_b • AnywhereYouGo.com http://www.anywhereyougo.com/
  • 3. ABSTRACT • Bluetooth is a way of connecting machines to each other without cables or any other physical medium. • It uses radio waves to transfer information, so it is very susceptible to attacks. • This paper first gives some background information about Bluetooth system and security issues in ad hoc networks, then it concentrates on specific security measures in Bluetooth, mainly authentication, encryption, key management and ad hoc aspects. • Then it points out flaws and possible security holes in the Bluetooth Security Specification
  • 4. Origin of the name and the logo • Bluetooth was named after a late tenth century king, Harald Bluetooth, King of Denmark and Norway. He is known for his unification of previously warring tribes from Denmark (including now Swedish Scania, where the Bluetooth technology was invented), and Norway. Bluetooth likewise was intended to unify different technologies, such as personal computers and mobile phones.The name may have been inspired less by the historical Harald than the loose interpretation of him in The Long Ships by Frans Gunnar Bengtsson, a Swedish Viking- inspired novel. • The Bluetooth logo merges the Germanic runes analogous to the modern Latin letter H and B: (for Harald Bluetooth) (Hagall) and (Berkanan) • merged together, forming a bind rune.
  • 5. What is Bluetooth? • Open wireless communication standard – www.bluetooth.com • Focused on mobile wireless links – Small, low cost, low power consumption • Allows small ad hoc wireless networks – Piconet • 1 master and up to 7 active slaves – Scatternet • Communication between Piconets
  • 6. What is Bluetooth? • 2.4 GHz Open band – Globally available – Other devices include microwave ovens, cordless phones – Frequency hopping and Time Division Multiplexing • 10 – 100 meter range – Up to 8 active devices can be in the same piconet
  • 7. Related Standards • IrDA: Infrared Data Association – Infrared “beaming” – Short distances (~1 meters) – Point-to-point, line-of-sight communication • 802.11B and Home RF – Higher bandwidth – Don’t support voice – More expensive – Require more power
  • 8. Bluetooth versionsBluetooth versions  Bluetooth 1.0 and 1.0B  Versions 1.0 and 1.0B had many problems  Manufacturers had difficulty making their products interoperable.  Bluetooth 1.1  Many errors found in the 1.0B specifications were fixed.  Added support for non-encrypted channels.  Received Signal Strength Indicator (RSSI).  Bluetooth 1.2  Faster Connection and Discovery  Use the Adaptive frequency-hopping spread spectrum (AFH)  improves resistance to radio frequency interference  Higher transmission speeds in practice, up to 721 kbps  Bluetooth 2.0  This version, specified November 2004  The main enhancement is the introduction of an enhanced data rate (EDR) of 3.0 Mbps.  Lower power consumption through a reduced duty cycle.  Simplification of multi-link scenarios due to more available bandwidth.  Bluetooth 2.1  A draft version of the Bluetooth Core Specification Version 2.1 + EDR is now available
  • 9. Bluetooth System Components • Link Manager: - Link Layer messages for setup and link control Base band : - base band protocols and low level link routines • Radio unit : – actual radio transceiver which enables the wireless link between Bluetooth devices
  • 11.
  • 12. Bluetooth Security 1. non-secure – device does not initiate any kind of security procedure 2. service-level security – more flexibility in application access policies is allowed 3. link level security – device sets up security procedures before the link set- up is completed. – Link level security provides applications with knowledge of "who" is at the other end of the link and provide authentication, authorization, and encryption services
  • 13. Typical Bluetooth Operation • Discover single or multiple devices • Create an link to the device • Create a socket – SDP: Service Discovery Protocol – Used by Virtual Serial Driver – Data Connection • Pass Data • Close Socket, close link
  • 15. Key generating algorithm E22 for master and initialization keys
  • 19. Problems in the Security of Bluetooth • Radio jamming attacks • Buffer overflow attacks • Blocking of other devices • Battery exhaustion • Man in the middle attacks • Sometimes: default = no security • possible to track devices (and users)
  • 20. Recommendations • Never use unit keys!!!! • Use long and sufficiently random PINs • Always make sure security is turned ‘on’
  • 21. Bluetooth™ Wireless Technology Application Areas • Pure computing applications – Presentations – Card Scanning – Synchronizing Data – Remote Synchronization – Printing – Scanners • Ubiquous Applications – Communicator platforms – Electronic Books – Travel – Home Entertainment • System Applications – In-vehicle systems – Payment Systems – Behavior Enforcement – Collaboration – Mobile E-commerce
  • 22.
  • 23. 802.15 Wireless Personal Area802.15 Wireless Personal Area Network(WPAN) Working GroupNetwork(WPAN) Working Group  Working Groups summary 802.15 802.15.1 802.15.2 802.15.4b802.15.3a 802.15.3b 802.15.4802.15.3  802.15.1 : WPAN/Bluetooth  802.15.2 : Coexistence Group  802.15.3 : High Rate(HR) WPAN Group  802.15.3a : UWB  802.15.3b : MAC Amendment Task Group  802.15.4 : Low Rate(LW) WPAN Group(Zigbee)  802.15.4a : WPAN Low Rate Alternative PHY  802.15.4b : Revisions and Enhancements  UWB Forum 802.15.4a
  • 24. Ultra Wide Band (UWB)Ultra Wide Band (UWB)  What is the UWB?  Transmitting information spread over a large bandwidth (>500 MHz)  Provide an efficient use of scarce radio bandwidth  High data rate in WPAN connectivity and longer-range  A February 14, 2002  Report and Order by the FCC authorizes the unlicensed use of UWB  November of 2005.  ITU-R have resulted in a Report and Recommendation on UWB  Expected to act on national regulations for UWB very soon.  The advantage of the UWB  Take advantage of inverse relationship between distance and throughput  Huge bandwidth : very high throughput  Low power consumption  Convenience and flexibility  No interference
  • 25. Ultra Wide Band(UWB)(2/2)Ultra Wide Band(UWB)(2/2) Wireless technology Power mW Rage meter BW/channel Rate bps CDMA 1xEVDO 600 ~2000 1.25 MHz 2.4M 802.16(WiMAX ) 250 ~4000 25MHz 120M 802.11g(WiFi) 50 ~100 25MHz 54M Bluetooth 1 ~10 1MHz <1M UWB <30 10~30 500MHz 100M~1G  Current wireless Comparison  Key application  Wireless USB  Toys and game  Consumer electronics  Location tracking  Handset
  • 26. 802.16 Broadband Wireless Access(BWA)802.16 Broadband Wireless Access(BWA) Working Group(1/2)Working Group(1/2)  IEEE 802.16  Be was established by IEEE Standards Board in 1999, aims to prepare formal specifications for the global deployment of broadband Wireless Metropolitan Area Network.  A unit of the IEEE 802 LAN/MAN Standards Committee.  A related technology Mobile Broadband Wireless Access(MBWA) Fixed (Stationary) Pedestrian (Nomadic) Mobile (Vehicular) 2G/2.5G Cellular 0.1 1.0 10 100 Peak Data Rate per User (Mbits/second) Mobility 802.16e 802.16a (WiMAX) WWAN (IMT-2000) cdma2000® 1xEV-DO, cdma2000® 1xEV-DV 3.1 WCDMA HSDPA 802.15.1 (Bluetooth) 802.11 (WLAN) 802.15.3a (UWB)
  • 27. 802.16 Broadband Wireless Access(BWA)802.16 Broadband Wireless Access(BWA) Working Group(2/2)Working Group(2/2)  Working Groups summary 802.16 802.15.g 802.15.h 802.15.k802.15.j802.16.f 802.15.m802.15.i  802.16f : Management Information Base  802.16g : Management Plane Procedures and Services  802.16h : Improved Coexistence Mechanisms for License-Exempt Operation  802.16i : Mobile Management Information Base  802.16j : Multihop Relay Specification  802.16k : Bridging of 802.16  802.16m : Advanced Air Interface. Data rates of 100 Mbps for mobile applications and 1 Gbps for fixed applications.
  • 28. “Last Mile” Access Alternatives Blue- tooth Blue- tooth Broadband Capable Terrestrial Wireless NetworksBroadband Capable Terrestrial Wireless Networks UWB 802.1 5 UWB 802.1 5 Personal Area Networks (PANs) Range50 feet 500 feet 10’s miles Metropolitan Area Networks (MANs) WLAN 802.1 1 WLAN 802.1 1 Local Area Networks (LANs) Wide Area Networks (WANs) Cellular 2.5 G, 3G Cellular 2.5 G, 3G Edge, CDMA2000, 1xEV-DO, UMTS MMDS LMDS WMAN (802.16d) WMAN (802.16e) Mobile WiMAX
  • 29. Final Thoughts • A single-chip solution is the ultimate goal – Around $5/chip – Several players have begun developing implementations • Success of device depends on – The supplier’s ability to deliver implementation at a low price point – Application development that is easily integrated with today’s infrastructure – Ability of Bluetooth to meet market’s expectations
  • 30. REFERENCES • [1]Amoroso E., Fundamentals of Computer Security Technology, Prentice Hall, 2004. • [2]Asokan N. & Ginzboorg P., Key Agreement in Ad-Hoc Networks, Prentice Hall, 2002 • [3]Bluetooth, The Bluetooth Specification, v.1.0B < http://www.bluetooth.com/developer/specification/specification.asp > • [4]Zhou L. & Haas Z., Securing Ad Hoc Networks < http://www.ee.cornell.edu/~haas/Publications/network99.ps > • [5]Gollmann D., Computer Security, John Wiley & Sons Inc., 2003. • [6]Müller T., Bluetooth Security Architecture, 1999 < http://www.bluetooth.com/developer/download/download.asp?doc=174 >