Security Weaknesses in Bluetooth
نویسندگان
چکیده
We point to three types of potential vulnerabilities in the Bluetooth standard, version 1.0B. The first vulnerability opens up the system to an attack in which an adversary under certain circumstances is able to determine the key exchanged by two victim devices, making eavesdropping and impersonation possible. This can be done either by exhaustively searching all possible PINs (but without interacting with the victim devices), or by mounting a so-called middle-person attack. We show that one part of the key exchange protocol – an exponential backoff method employed in case of incorrect PIN usage – adds no security, but in fact benefits an attacker. The second vulnerability makes possible an attack – which we call a location attack – in which an attacker is able to identify and determine the geographic location of victim devices. This, in turn, can be used for industrial espionage, blackmail, and other undesirable activities. The third vulnerability concerns the cipher. We show two attacks on the cipher, and one attack on the use of the cipher. The former two do not pose any practical threat, but the latter is serious. We conclude by exhibiting a range of methods that can be employed to strengthen the protocol and prevent the newly discovered attacks. Our suggested alterations are simple, and are expected to be possible to be implemented without major modifications.
منابع مشابه
Security of Bluetooth: An overview of Bluetooth Security
The purpose of this paper is to give an overview of Bluetooth security and how it was designed. At the end there is also a short discussion of its weaknesses on a general level.
متن کاملImproved NC association security model based on Bluetooth 4.0
In this paper, the potential security weaknesses in the process of Secure Simple Pairing which is introduced by Bluetooth 4.0 are analyzed, and an improved method of Secure Simple Pairing is proposed to compensate the security concerns.
متن کاملDesign, Implementation, and Evaluation of Bluetooth Security
Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. This article provides a study on the security issues behind the Bluetooth standard. After a overview of the general Bluetooth protocol, a security fr...
متن کاملZero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption
This paper presents a protocol aiming at proving that an encryption system contains structural weaknesses without disclosing any information on those weaknesses. A verifier can check in a polynomial time that a given property of the cipher system output has been effectively realized. This property has been chosen by the prover in such a way that it cannot been achieved by known attacks or exhau...
متن کاملMobile and Wireless Communications Security
This article presents an overview of security issues for mobile and wireless communications. It describes the security requirements and architectural options for these networks. Subsequently three technologies are discussed in more detail: mobile phones (GSM and 3GSM), Wireless LAN (IEEE 802.11) and Personal Area Networks (Bluetooth). A critical evaluation is given of the strengths and weakness...
متن کاملDraft - Do Not Publish ! Security Architectures
This article briefly describes the most important security protocols of the Bluetooth security architecture for Wireless Personal Area Networks (WPAN). We mainly focus on the key agreement protocol, which is the most critical part of this security architecture. The strengths and weaknesses of these solutions are discussed and perspectives on improvements are pre-
متن کامل