Preview

Attacks On Bluetooth Devices

Powerful Essays
Open Document
Open Document
935 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Attacks On Bluetooth Devices
Toshendra Sharma, 113050013
Saptarshi Sarkar, 113050044
Pankaj Vanwari, 114058001
Under guidance of:
Prof. Bernard Menezes

Outline
 Bluetooth history
 Bluetooth Protocol
 Layers in Bluetooth
 Security in Bluetooth
 Vulnerabilities
 Attacks/Exploits
 Demonstration

Bluetooth Technology
 proprietary open wireless technology standard for

exchanging data over short distances
 was originally conceived as a wireless alternative to RS232 data cables
 It uses short wave length radio transmission in ISM band from 2400-2480 MHz

Benefits of Bluetooth Technology
 Cable replacement
 Ease of file sharing
 Wireless synchronization
 Internet connectivity

Implementation
 frequency hopping spread spectrum
 chops up the data being sent and transmits chunks of

it up to 79 bands
 Packet Based Protocol with a Master-Slave
Structure
 Piconet
 A piconet is an ad-hoc computer network which used to

link group of devices, where protocols allow one master device to interconnect with up to seven active slaves

Bluetooth Profiles
 Bluetooth Profile is a specification regarding an aspect

of Bluetooth based wireless communication between devices Bluetooth Architecture
 two specifications:
 the core and
 the profile specifications
 The core specification discusses how the technology

works
 profile specification focuses on how to build interoperating devices using the core technologies

Bluetooth Protocol
 Bluetooth Controller
 Bluetooth Host
 The physical links are created on the basis of

masters/slaves

Typical
Scatternet

Layers in bluetooth

Device Address (BD_ADDR)

 NAP: Nonsignificant Address Part
 UAP: Upper Address Part
 LAP: Lower Address Part

Bluetooth Security
 Authentication
 Confidentiality
 Authorization

 Security Modes
 Non-secure
 Service level enforced security
 Link level enforced security

Authentication
 Step 1. The verifier transmits a 128-bit random

challenge (AU_RAND) to the claimant.
 Step 2. The claimant uses

You May Also Find These Documents Helpful

  • Best Essays

    Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)…

    • 355 Words
    • 3 Pages
    Best Essays
  • Satisfactory Essays

    Watch the Demo Lab in Learning Space Unit 2 and then answer each of the following questions.…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The network covers the connection between two devices connected at a close range, using a standard such as Bluetooth.…

    • 1327 Words
    • 6 Pages
    Better Essays
  • Good Essays

    IS3230 Lab 4

    • 528 Words
    • 2 Pages

    6. WLAN such as wireless A, B, or G is commonly used for networking computers wirelessly and Bluetooth is a trademarked communications protocol initially designed for wireless keyboards and mice but now most commonly used for wireless cell phone headsets.…

    • 528 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Week 4 Lab Part 1: Network Traffic Analysis and Baseline Definition & Secure WLAN Solution…

    • 2612 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN).…

    • 920 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    At the start of December the teacher asked me to design a display which embodied the spirit of the Nativity Story. The display was to be situated on the board above the pegs where the children hang their coats. It was to be put here so that it can be instantly noticed by parents/carers, the children and all visitors to the classroom.…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Today’s advances in physical security are just temporary because criminals are learning ways to get around these systems. By always upgrading and…

    • 3592 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Carphone Cyber Attack

    • 221 Words
    • 1 Page

    2.4 million customers may have been affected in a "sophisticated cyber attack" on a division mobile phone retailer Carphone Warehouse last week. The cyber attack was discovered on 5th August after reportedly happening for up to two weeks prior. In a statement on their website, Dixons Carphone, who own Carphone Warhouse, admitted the information accessed included names, addresses, birth dates and bank details, and that 90,000 pieces of encrypted credit card data may also have been compromised.…

    • 221 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Financial institutions should actively monitor and notify security alert organizations for notices related to their wireless application services.…

    • 1375 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Not only would Apple’s main policy of privacy be violated if they let the FBI hack into Farook’s phone, but it would have damaged the company and our rights all together. “Basic American rights were at stake, and the purpose of the law is to protect people’s rights” (“PRO/CON: Should Apple have resisted FBI pressure to hack an iPhone?” Newsela). Technically, Apple has a right to refuse the orders of the FBI that reflects their company in a negative way. If Apple would have accepted the order of the FBI, our rights as Americans would have been at risk. Moreover, not only would our rights as Americans be at risk, the entire company could have been damaged because of what the law was asking for. “The FBI did not ask Apple to turn over information…

    • 249 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    In an article from the Washington Post, it is implied that there is no personal privacy within our technological world. Craig Timberg’s article, “Cellphones Used As Secret Trackers” startles the smartphone users of our society by revealing that their location can be found and tracked by anyone at anytime. This reminds me of the novel 1984 by George Orwell, in which privacy is nonexistent. There is an incredibly strict control of the people within this dystopian society and with the use of electronics, privacy can no longer survive. A notable quote from the book helps to describe the type of world the people live in, “If you want to keep a secret, you must also hide it from yourself” (Orwell 37). While it is great that our technology is advancing,…

    • 296 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    With the rise in popularity of Wi-Fi and Bluetooth technology embedded into smartphones, it has gained the attention of hackers out to gather information as another way to get into a system. Bluetooth technology is a very small area networking device, meaning that it can communicate wirelessly to other Bluetooth devices in the vicinity of 25-30 feet. But that also means that any hacker with that same technology can gain entry into a smartphone and wreak havoc that way. Any information stored on that phone is now available to them to take and do with as they please. The only disadvantage to a hacker using Bluetooth is that they have to be within range, so they typically target large crowds of people if they are going to use that transmission medium to gather information.…

    • 913 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Data Security is primary concern for every communication system. There are many ways to provide security data that is being communicated. However, what if the security is assured irrespective of the hackers are from the noise. This Project describes a design of effective security for data communication by designing standard algorithm for encryption and decryption. R.F. is a PAN technology based on the IEEE 802.15.4 standard. Unlike Bluetooth or wireless USB devices, R.F. devices have the ability to form a mesh network between nodes. Meshing is a type of daisy chaining from one device to another. This technique allows the short range of an individual node to be expanded and multiplied, covering a much larger area. The source information is generated by a key pad and this will be encrypted and is sent to destination through R.F. modules. The receiving system will check the data and decrypt according to a specific algorithm and displays on the LCD.This project uses regulated 5V, 500mA power supply. 7805 three terminal voltage regulator is used for voltage regulation. Bridge type full wave rectifier is used to rectify the ac output of secondary of 230/12V step down transformer.…

    • 1101 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Androids Under Attacks

    • 1225 Words
    • 5 Pages

    Android & Co started in 1913 when Arthur and Clarence, both from the audit firm of Price bought out a small audit firm in Illinois to form Arthur, Clarence & Co, which became Androids & Co in 1918. Android headed the firm of Androids & Co until his death in 1945.Besides, Android who is founder of Androids & Co was a zealous supporter of high standards in the accounting industry. In 1945, Leonardo Sparky, who succeeded Android at the founder’s death, continued this emphasis on honesty. For many years, the Android’s motto was “Think Straight, Talk Straight”.…

    • 1225 Words
    • 5 Pages
    Better Essays

Related Topics