Bluetooth Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

CMR TECHNICAL CAMPUS

UGC AUTONOMOUS
Accredited by NBA & NAAC with A Grade
Approved by AICTE, New Delhi and Affiliated to JNTU, Hyderabad

Department of Information Technology

TECHNICAL SEMINAR
ON
BLUETOOTH NETWORK SECURITY
PRESENTED BY
MANOJ KUMAR GEDELA
217R1A1288
IT-B
Bluetooth Security

 How security is implemented for services


running on Bluetooth devices, and future
security issues for this technology.
Agenda:
 INTRODUCTION

 ABOUT BLUETOOTH

 BLUETOOTH NETWORKS

 BLUETOOTH ARCHITECTURE

 SECURITY ASPECTS IN BLUETOOTH

 CONNECTION ESTABLISHMENT

 USED SOFTWARE

A) FOR DISCOVERING DEVICES

B) FOR HACKING

 EFFECTIVENESS OF ATTACK

 CONCLUSION
INTRODUCTION
 Origin of Bluetooth
 Concept and Need: Developed to replace cables with short-range wireless
communication.
 Creation and Development: Started by Ericsson in 1994.
 Founding Group: Formed by the Bluetooth Special Interest Group (SIG) with Ericsson,
Intel, Nokia, IBM, and Toshiba in 1998.
 Naming: Named after Danish king Harald "Bluetooth" Gormsson.
 First Specification: Bluetooth 1.0 released in 1999.
 Standardization and Growth: Quickly became a standard for wireless communication.
 Evolution: Continuously updated and improved by the Bluetooth SIG, enhancing speed,
range, and security.
About Bluetooth:

 Key Features:

 Frequency: 2.4 GHz ISM band.


 Range: Typically 10 meters, up to 100 meters
(Class 1).
 Speed: Up to 3 Mbps with Bluetooth 2.0 +
EDR.
 Security: Frequency Hopping Spread
Spectrum (FHSS) and encryption.

 Devices:

Smartphones, laptops, headphones, speakers,


smartwatches.
Applications: Wireless audio streaming, file
transfer, tethering, IoT connectivity.
Types:

 Bluetooth devices can form three types of networks:

 Point to Point Link


 Piconet Network
 Ad-hoc or Scatternet Network

 Point to Point Link: When two Bluetooth enabled devices share information or
data that is called point to point link

Master Network/
Slave device
device Link
 Piconet Network: When there is a collection of devices paired with each
other, it forms a small personal area network called Piconet. A Piconet
consists of a master and at most seven active slaves. Each Piconet has its
own hopping sequence and the master and all slaves share the same channel.

Slave
devic
e

Master
Device
Slave Slave
devic devic
e e
 Ad-hoc or Scatternet Network: Two or more piconets
connected to each other by means of a device called bridge,
participating in both the piconets, form a Scatternet Network.
The role of bridge is to transmit data across piconets.
Master
device
Slave Slave
device device
Bridge
Device
Slave Slave
device device
Master
device
Bluetooth Architecture:

 The Bluetooth core system has three parts:

 RF Transceiver: Handles radio frequency


transmission
 Baseband: Manages physical layer and link
control
 Protocol Stack: Ensures communication
between devices
Security Aspects in Bluetooth
 Inherent Vulnerabilities:

Bluetooth devices can be used for bugging


Potential for unauthorized access and data theft

 Common Attack Tools:


Bluebugger, Bluediving, Bluescanner, Bluesnarfer, BTscanner, Redfang,
Blooover2
Connection Establishment

 Pairing Process:
 Step 1: Initiate Pairing: Devices must be in discoverable mode to start the
pairing process.
 Step 2: Exchange Keys: Devices exchange security keys to establish a trusted
connection.
 Step 3: Secure Connection: After exchanging keys, the devices are paired and
can communicate securely.

 Attack Methodology:
 Discoverable Mode: Attackers can see devices that are in discoverable mode.
 Hidden Devices: Even hidden devices can sometimes be found using special
tools.
 Information Retrieval: Attackers can get basic information like device names
and types.
Used Software (For Discovering Devices)

 BlueScanner: Searches for Bluetooth-enabled devices and extracts


information

 BlueSniff: GUI-based utility for finding discoverable and hidden devices

 BTBrowser: J2ME application for browsing technical specifications of


nearby devices

 BTCrawler: Scans for devices and performs service queries, implements


BlueJacking and BlueSnarfing
Used Software (For Hacking)

 Bluejacking:
 What It Is: Sending unwanted messages to other Bluetooth devices.
 Effect: Annoying but generally not harmful.

 OBEX Push:
 What It Is: Sending files to a device without needing permission.
 Effect: Files are automatically accepted, bypassing security.

 Bluesnarfing:
 What It Is: Stealing data from a device through Bluetooth.
 Effect: Can access and steal information like contacts and messages.
Effectiveness of Attacks

Laptop Attacks:

 User Input Needed: Attacks need you to click or approve


something.
 Password Protection: Attacks fail if your laptop asks for a
password.

Mobile Attacks:
 User Approval Needed: Attacks need you to accept a
connection.
 Suspicious Filenames: Unusual filenames can stop the
attack.
Advantages of Bluetooth Disadvantages of Bluetooth

Wireless Communication: Eliminates the need for cables. Limited Range: Effective range is typically up to 10 meters (can
extend to 100 meters for Class 1 devices).

Low Power Consumption: Designed for low energy usage, ideal Data Transfer Speed: Slower compared to other wireless
for portable devices. technologies like Wi-Fi.

Cost-Effective: Affordable to implement in a wide range of Security Concerns: Vulnerable to various security attacks if not
devices. properly secured.

Ease of Use: Simple pairing process and user-friendly. Interference: Can experience interference from other devices
operating in the 2.4 GHz ISM band.

Universal Compatibility: Supported by most modern devices like Battery Drain: Continuous use can drain the battery of portable
smartphones, laptops, and headphones. devices.
CONCLUSION:

 Know Social Engineering: Be aware of tricks people use to access your device.

 Educate Users: Teach people to recognize threats.

 Hide or Turn Off Devices: Keep your Bluetooth hidden or off when not in use.

 Require User Input: Set your device to ask for approval before connecting.

 No Extra Security Software: There’s no special software for Bluetooth security yet.
THANK YOU

You might also like