Download Document

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Information security wikipedia , lookup

Unix security wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Authentication wikipedia , lookup

Stingray phone tracker wikipedia , lookup

Access control wikipedia , lookup

One-time pad wikipedia , lookup

Security and safety features new to Windows Vista wikipedia , lookup

Quantum key distribution wikipedia , lookup

Public-key cryptography wikipedia , lookup

Security-focused operating system wikipedia , lookup

Computer security wikipedia , lookup

Cryptography wikipedia , lookup

Cryptanalysis wikipedia , lookup

Web of trust wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Diffie–Hellman key exchange wikipedia , lookup

Wireless security wikipedia , lookup

History of cryptography wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Mobile security wikipedia , lookup

Transcript
An Analysis of
Bluetooth Security
Team A:
Padmaja Sriraman
Padmapriya Gudipati
Sreenivasulu Lekkala
Introduction
Short range radio technology which
utilizes wireless protocol.
 Can transmit data up to 100 meters.
 Composed of 8 active devices which
share a master – slave relationship.
 Developed by Bluetooth Special
Interest Group (SIG).

Types of keys
LINK KEY
SEMI TRANSPARENT
UNIT KEY
TEMPORARY KEY
COMBINATION KEY
INITIALIZATION
MASTER
CIPHERING KEY
ENCRYPTION KEY
CONSTRAINED ENCRYPTION KEY
PAYLOAD KEY
Security Architecture
Generation of initialization key
 Authentication
 Generation of link key
 Link key exchange
 Generation of encryption key

Key Pairing





Generation of initialization key: A method similar
to SAFER+ Block Cipher is used. The input to
this method is the public address of the
bluetooth unit, PIN, length of the pin and a
random number
Authentication: This process involves a
challenge-response scheme.
Link key generation: Any one type of the key is
generated.
Link key exchange: The generated key is
exchanged.
Generation of encryption key: Uses Cipher Keys
for encryption of data
Modes of Operation




Mode 1 – No Security. Authentication and
encryption are bypassed.
Mode2 –Service level security. Used after
the link connection is established.
Mode3 – Link level security. Uses the link
keys.
Mode4 – Similar to Mode2 but with
enhanced security techniques
Eavesdropping



Attacker can see and change the
payload
Easy when it is not encrypted
One solution is frequency hopping
technology



2.4 GHZ ISM band which is license free
Hops between frequencies in pseudorandom order
Difficult to pick up the signal
Impersonation

Receivers want to be sure that they receive from
original sending party
 Attacker impersonates the sending unit
• Needs to give correct response to the challenge
• Not easy, No attack on SAFER+ known

Changes the payload data
• Easy if no encryption, manipulate CRC
• Since CRC calculation is a linear task
• Attacker can compute how to modify CRC according
to modification to encrypted data
Combination key generation
K= current link key
KAB = Combination key
Pairing

Can be prone to attack if it is done in
public places

The current link key used to generate the
combination key, KAB, is derived as
KINT=E22(BD_ADDR_A, IN_RAND,PKEY)
PKEY is the secret pass key
 If an attacker can guess PKEY, he can
calculate combination key
 If PKEY is short, it becomes easy to
guess it

Authentication(ChallengeResponse)
Verifier
BD_ADDRB
Claimant
AU_RAND
Calculates
SRES’



SRES
Success if SRES’==SRES
SRES=E1(KAB,AU_RAND,BD_ADDRB)
If PKEY is small, attacker can try possible
value to get a match between SRES’ and SRES
Short passkey values should be avoided
Improper key storage

Disclosure of keys




Malicious USB plugs, Viruses, Trojan horses
Device should be paired with hosts it is
allowed on
Host should communicate only with trusted
parties
Adding link key to the database without
pairing



Device assumes that valid bonding exists
Restrict the access
Encrypt the database
Contd…

Denial of service
Delete or corrupt the link keys in the
database
 Change the CRC along with the keys
 Authentication fails repeatedly, waiting
time increases
 Solution is to request new pairing
 Need to provide good integrity
protection to the database

Location Tracking




Tracking users movements by tracking
bluetooth device
Bluetooth access codes CAC, LAC, IAC are
derived from the device address
These codes help in tracking
To prevent this devices operate in
anonymity mode updating their device
address randomly
Implementation flaws




Key database management, user
interaction, memory protection
Snarf attack – Set up connection without
consent or alerting
Backdoor attack – Erase link from list of
paired devices but not from database of
the victim. Attacker attacks the target
Bluejacking – Sending unsolicited
messages to bluetooth devices
Security for Bluetooth
Applications
•
•
•
1.
2.
3.
Bluetooth security will depend on the
application exactly how one should
use.
Some applications need more security
design than other applications because
some applications are more security
sensitive.
Here we discuss the security
mechanisms for three different
bluetooth applications.
Headset.
Network Access.
SIM Access.
Headset






The Bluetooth headset profile is used for headset
connections to mobile phones and laptops.
The security association is used to authenticate
and encrypt all communication between two
Bluetooth wireless devices.
Bluetooth pass-key usage can prevent illegal use
of stolen headset.
A typical headset configuration consists of two
devices a headset (HS) and audio gateway (AG).
AG is typically a cellular phone , laptop , PC.
The communication between HS and AG is
protected by the authentication and encryption
mechanisms.
Headset (contd..)




The HS and AG need to store the passkeys and link-keys for secure connections.
HS usually does not have the user
interface , AG will control some of the
basic settings of HS (e.g volume setting,
changing the passkey).
The pairing will only succeed if only the
AG knows the correct pass-key of HS.
If the HS is stolen , the thief will not
know the pass-key and will not succeed
to connect to the HS with another AG.
Network Access




Network access to an IP network in Bluetooth
is provided through PAN profile.
Network access points (NAcP) connected to LAN
through wired network in one side and the other
side Bluetooth wireless devices will be
connected.
NAcPs can be accessed by anybody because it is
open , but service will be restricted by service
provider , only authorized persons will be
allowed to access the network.
Suggested security architecture is built around
common access key (CAK) concept .
SIM Access




The SIM (subscription identity module)
access application is provided by a
Bluetooth profile.
A SIM card is an integrated circuit used in
GSM mobile telephone system. It is used
to hold the subscriber information.
The Bluetooth SIM access profile defines
procedures and protocols for access to a
remote SIM over a Bluetooth connection.
The SIM is used for security critical
services. The card holds secret keys and
subscriber information.
Conclusion
Bluetooth is a widely used
technology for short distance
wireless communication
 Still has security loopholes and
research is going on to improve
security

References
[1] Christian Gehrmann, Joakim Persson, Ben Smeets,
Bluetooth Security, Artech House, 2004
[2] http://www.cs.utk.edu/~tyang/wireless/blue.htm
[3] http://www.cs.utk.edu/~dasgupta/bluetooth/
[4] http://en.wikipedia.org/wiki/Bluetooth
[5]. http://www.bluetooth.com/Bluetooth/Technology