Saptarshi Sarkar, 113050044
Pankaj Vanwari, 114058001
Under guidance of:
Prof. Bernard Menezes
Outline
Bluetooth history
Bluetooth Protocol
Layers in Bluetooth
Security in Bluetooth
Vulnerabilities
Attacks/Exploits
Demonstration
Bluetooth Technology
proprietary open wireless technology standard for
exchanging data over short distances
was originally conceived as a wireless alternative to RS232 data cables
It uses short wave length radio transmission in ISM band from 2400-2480 MHz
Benefits of Bluetooth Technology
Cable replacement
Ease of file sharing
Wireless synchronization
Internet connectivity
Implementation
frequency hopping spread spectrum
chops up the data being sent and transmits chunks of
it up to 79 bands
Packet Based Protocol with a Master-Slave
Structure
Piconet
A piconet is an ad-hoc computer network which used to
link group of devices, where protocols allow one master device to interconnect with up to seven active slaves
Bluetooth Profiles
Bluetooth Profile is a specification regarding an aspect
of Bluetooth based wireless communication between devices Bluetooth Architecture
two specifications:
the core and
the profile specifications
The core specification discusses how the technology
works
profile specification focuses on how to build interoperating devices using the core technologies
Bluetooth Protocol
Bluetooth Controller
Bluetooth Host
The physical links are created on the basis of
masters/slaves
Typical
Scatternet
Layers in bluetooth
Device Address (BD_ADDR)
NAP: Nonsignificant Address Part
UAP: Upper Address Part
LAP: Lower Address Part
Bluetooth Security
Authentication
Confidentiality
Authorization
Security Modes
Non-secure
Service level enforced security
Link level enforced security
Authentication
Step 1. The verifier transmits a 128-bit random
challenge (AU_RAND) to the claimant.
Step 2. The claimant uses