Bluetooth Security
Bluetooth Security
Bluetooth Security
UGC AUTONOMOUS
Accredited by NBA & NAAC with A Grade
Approved by AICTE, New Delhi and Affiliated to JNTU, Hyderabad
TECHNICAL SEMINAR
ON
BLUETOOTH NETWORK SECURITY
PRESENTED BY
MANOJ KUMAR GEDELA
217R1A1288
IT-B
Bluetooth Security
ABOUT BLUETOOTH
BLUETOOTH NETWORKS
BLUETOOTH ARCHITECTURE
CONNECTION ESTABLISHMENT
USED SOFTWARE
B) FOR HACKING
EFFECTIVENESS OF ATTACK
CONCLUSION
INTRODUCTION
Origin of Bluetooth
Concept and Need: Developed to replace cables with short-range wireless
communication.
Creation and Development: Started by Ericsson in 1994.
Founding Group: Formed by the Bluetooth Special Interest Group (SIG) with Ericsson,
Intel, Nokia, IBM, and Toshiba in 1998.
Naming: Named after Danish king Harald "Bluetooth" Gormsson.
First Specification: Bluetooth 1.0 released in 1999.
Standardization and Growth: Quickly became a standard for wireless communication.
Evolution: Continuously updated and improved by the Bluetooth SIG, enhancing speed,
range, and security.
About Bluetooth:
Key Features:
Devices:
Point to Point Link: When two Bluetooth enabled devices share information or
data that is called point to point link
Master Network/
Slave device
device Link
Piconet Network: When there is a collection of devices paired with each
other, it forms a small personal area network called Piconet. A Piconet
consists of a master and at most seven active slaves. Each Piconet has its
own hopping sequence and the master and all slaves share the same channel.
Slave
devic
e
Master
Device
Slave Slave
devic devic
e e
Ad-hoc or Scatternet Network: Two or more piconets
connected to each other by means of a device called bridge,
participating in both the piconets, form a Scatternet Network.
The role of bridge is to transmit data across piconets.
Master
device
Slave Slave
device device
Bridge
Device
Slave Slave
device device
Master
device
Bluetooth Architecture:
Pairing Process:
Step 1: Initiate Pairing: Devices must be in discoverable mode to start the
pairing process.
Step 2: Exchange Keys: Devices exchange security keys to establish a trusted
connection.
Step 3: Secure Connection: After exchanging keys, the devices are paired and
can communicate securely.
Attack Methodology:
Discoverable Mode: Attackers can see devices that are in discoverable mode.
Hidden Devices: Even hidden devices can sometimes be found using special
tools.
Information Retrieval: Attackers can get basic information like device names
and types.
Used Software (For Discovering Devices)
Bluejacking:
What It Is: Sending unwanted messages to other Bluetooth devices.
Effect: Annoying but generally not harmful.
OBEX Push:
What It Is: Sending files to a device without needing permission.
Effect: Files are automatically accepted, bypassing security.
Bluesnarfing:
What It Is: Stealing data from a device through Bluetooth.
Effect: Can access and steal information like contacts and messages.
Effectiveness of Attacks
Laptop Attacks:
Mobile Attacks:
User Approval Needed: Attacks need you to accept a
connection.
Suspicious Filenames: Unusual filenames can stop the
attack.
Advantages of Bluetooth Disadvantages of Bluetooth
Wireless Communication: Eliminates the need for cables. Limited Range: Effective range is typically up to 10 meters (can
extend to 100 meters for Class 1 devices).
Low Power Consumption: Designed for low energy usage, ideal Data Transfer Speed: Slower compared to other wireless
for portable devices. technologies like Wi-Fi.
Cost-Effective: Affordable to implement in a wide range of Security Concerns: Vulnerable to various security attacks if not
devices. properly secured.
Ease of Use: Simple pairing process and user-friendly. Interference: Can experience interference from other devices
operating in the 2.4 GHz ISM band.
Universal Compatibility: Supported by most modern devices like Battery Drain: Continuous use can drain the battery of portable
smartphones, laptops, and headphones. devices.
CONCLUSION:
Know Social Engineering: Be aware of tricks people use to access your device.
Hide or Turn Off Devices: Keep your Bluetooth hidden or off when not in use.
Require User Input: Set your device to ask for approval before connecting.
No Extra Security Software: There’s no special software for Bluetooth security yet.
THANK YOU