Enhancements to Bluetooth Baseband Security

نویسندگان

  • Christian Gehrmann
  • Kaisa Nyberg
چکیده

Bluetooth system has been developed by Bluetooth Special Interest Group (Bluetooth SIG) as a cable replacement for short-range connectivity. In Bluetooth, special effort has been taken to develop and standardise adequate security mechanisms and procedures for protecting the wireless radio link. This set of mechanisms is defined in the Bluetooth Baseband specification [5] and is referred to as Bluetooth Baseband security. It is based on strong cryptographic algorithms and well-established security principles. Still, more work is required to integrate Bluetooth Baseband security into various applications that may have very different link layer security requirements. Bluetooth Baseband security is implemented in the Bluetooth module and is common to all Bluetooth units. Also the application specific security functionality may need to be standardised for interoperability. Recently, Jakobsson and Wetzel identified some potential trap holes in Bluetooth security in [11]. Their main concerns were certain weak options included in the Bluetooth security standard. They also criticised the way Bluetooth units make themselves discoverable by other units just by broadcasting messages that include their unique identities in clear. The purpose of this paper is to introduce some recent work in the area of Bluetooth Baseband security. Specifically, we address the problems discovered by Jakobsson and Wetzel, and develop possible counter measures. First, a brief introduction to Bluetooth Baseband security is given. Then major security shortcomings are identified. These include usage of the unit key and the short Bluetooth PIN value in the initialisation procedure, on the one hand, and the privacy problem created by location tracking, on the other hand. In section 4, we discuss passkey-based methods of exchanging the Bluetooth link key. Using public key cryptography adequate security can be provided while keeping the passkey short for the user's convenience. Furthermore, in section 5, an application to LAN access is developed enabling access point roaming. Finally, in section 6, we describe a technique that offers reasonable protection against location tracking. Identities of Bluetooth units can be efficiently hidden from unauthorised units using temporary Bluetooth device addresses.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proposed evolution technologies for Bluetooth

This paper begins by highlighting key features of the Bluetooth baseband standard. Software simulated results for the transmission of symmetric asynchronous data link (ACL) packets are used to discuss bit rate capabilities of various timebounded and non-time bounded Bluetooth enabled consumer electronic devices. The investigation considers Bluetooth data medium (DM) and data high (DH) packet ty...

متن کامل

Analysis of the Packet Reception Statistics of Bluetooth v2+EDR in Fading Channels

II Bluetooth v2.0 + Enhanced Data Rate 2 II-A Baseband . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 II-B Physical layer: basic and enhanced rates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 II-C ACL baseband frame formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 II...

متن کامل

Area-efficient digital baseband module for Bluetooth wireless communications

This paper describes a small and portable digital baseband module developed for Bluetooth wireless technology. To achieve portability and the small size, much of the Bluetooth baseband layer protocols are implemented in software running on the embedded microcontroller while the minimal tasks of low-level baseband processing, UART and USB interfaces, and audio CODEC are performed on the dedicate...

متن کامل

Hardware Implementation of Bluetooth Security

S ecurity in pervasive computing is a complex issue that has been the subject of negative publicity in recent years due to poor implementations (such as the Wired Equivalent Privacy protocol used by IEEE 802.11). Many low-level protocols are not secure, and the use of more secure high-level protocols is limited by the processing capabilities of mobile devices. Bluetooth could enhance and extend...

متن کامل

Bluetooth Broadcasting Performance: Reliability and Throughput

This paper studies the performance of Bluetooth broadcasting scheme. The transmission of a Bluetooth broadcast packet is repeated several times to increase the reliability of broadcast. We have analyzed the effects of baseband ACL packet types, each of which has a different size and error protection scheme, on the broadcast performance in terms of reliability and effective throughput that can b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007