ON SECURITY OF BLUETOOTH WIRELESS SYSTEM. Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica
|
|
- Jared Shelton
- 5 years ago
- Views:
Transcription
1 ON SECURITY OF BLUETOOTH WIRELESS SYSTEM Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica Brno University of Technology Faculty of Electrical Engineering and Communication Department of Control and Instrumentation Kolejni 4, 61200, Abstract: This paper describes security features of Bluetooth PAN wireless network. Security aspects are explained step-by-step from the basic items and management to the authentication and data encryption. Finally, current problem with the Bluetooth security are presented. Copyright 2005 IFAC Keywords: System security, Wireless, PAN, Authentication, Encryption. 1. BLUETOOTH TECHNOLOGY Bluetooth technology is intended for wireless connection between human-oriented devices: PC, board, mouse, headset, mobile phone, PDA, GPS..., (SIG, 1998). IEEE approved Bluetooth-based wireless PAN standard in 2002 as IEEE Bluetooth v1.1 specification (IEEE , 2002). The Bluetooth technology provides peer-to-peer communication over relatively close proximity. The range for Bluetooth transmission varies form about 10 meters up to 100 meters for the most powerful devices (Class 1), similar to a typical wi-fi network. Typical application of Bluetooth is to create a temporary computer network. For example, several people in a meeting room are able to connect their laptops and PDAs to each other to share files. When you use Bluetooth to create a network, it is usually an ad hoc network. Computers communicate directly with each other; there is not a wireless access point, which can ensure security control over the network. Thus, security becomes a major concern because important data are exposed to the other member of the network not only in the meeting room but also anywhere in the above mentioned transmission range even not within your sight (Toms, 2005). 2. SECUTIRY ITMES In order to provide protection of the communication, the security at the link layer and application layer is ensured. Every Bluetooth device has four identification items used for the security features at the link layer (Bluetooth, 2001): 1. Bluetooth device address (BD_ADDR) - every Bluetooth transceiver has a unique 48 bits address that is derived from the IEEE802 standard. Structure of BD_ADDR is shown in Fig. 1. LAP and UAP are significant part of the BD_ADDR and enable total address space 232. BD_ADDR of the device is publicly known; it can be obtained either manually via test system interface, or automatically via inquiry command at every Bluetooth device. BD_ADDR - 48 bits NAP UAP 16 bits 8 bits Non-significant Address Part Upper Address Part MSB LAP 24 bits Lower Address Part Fig. 1. Structure of the Bluetooth device address 2. Private authentication, which is always 128 bits random number used by the authentication algorithm. 3. Private encryption is derived from the authentication during the authentication process. The size of the may vary between bits due to different requirements imposed on cryptographic algorithms in different countries and due to the increasing computing power of the attackers. The encryption is entirely different from the LSB
2 authentication and each time the encryption is activated a new encryption is generated; thus, the life time of the encryption is different to the authentication. 4. A random number RAND, which can be derived from a random or pseudo-random process in the Bluetooth device. The RAND is always 128 bits and it is changed frequently. For practical reasons, a software based solution with a pseudo-random generator is often used. Within Bluetooth, the requirements placed on the random numbers used are that they be non repeating and randomly generated. Non repeating means that the number shall not be repeated during the lifetime of the authentication. The expression randomly generated means that it shall not be possible to predict its value with the likehood that is greater than 1/2L, where L is a length). Bluetooth can operate in one of three security models shown in Fig. 2. Security Mode 1 non security Security Mode 2 security at the service level, after the communication channel is established Security Mode 3 security at the link level, after the communication channel is established Fig. 2. Bluetooth security modes Different security levels for Bluetooth devices and services are shown in Fig. 3. Level 1 - trusted Bluetooth Device Level 2 - untrusted Level 1 - authorisation and authentication is required Bluetooth Service Level 2 - only authentication is required Level 3 - open all devices Fig. 3. Security Levels for devices and services 3. KEY MANAGEMENT The encryption used during communication has a specific size and cannot be set by the user. The s size is set by a factory and the Bluetooth baseband processing does not accept an encryption given from higher software layers in order to prevent the user over-riding the permitted size. Changing a link should also be done through the defined baseband procedures. All security transactions between two or more parties are handled by the link. The link is a 128 bits random number which is used in the authentication routine and during the generation of the encryption. The lifetime of a link depends on whether it is a semi-permanent or a temporary. A semi-permanent link is stored in non volatile memory and may be used after the current session is terminated. The session is defined as the time interval for which the unit is a member of a particular piconet. A temporary lasts only until the current session is terminated and it cannot be reused. Temporary s are commonly used in pointto-multipoint connections, where the same information is transmitted to several recipients. In order to accommodate for different types of applications, four types of link s have been defined: the combination K AB the unit K A (K B ) the temporary K master the initialization K init The combination K AB and the unit K A (K B ) are functionally indistinguishable. The unit K A (K B ) is generated in a single unit A (B). The unit is generated once at installation of the Bluetooth unit. The combination K AB is derived from information in both units A and B, and is therefore always dependent on two units. The master K master is a temporary, which replaces the current link. It can be used when the master unit wants to transmit information to more than one recipient simultaneously using the same encryption. The initialization K init is used as link during the initialization process when there are not yet any unit or combination s or when a link has been lost. The is derived from a random number, Personal Identification Number (PIN) code, and a BD_ADDR. This is only to be used during initialization. The length of the PIN code used in Bluetooth devices can vary between 1 and 16 bytes. For the longer lengths the units exchange PIN codes not through human interaction, but rather through methods supported by software at the application layer. The PIN code of the device can be fixed, so that it needs to be entered only to the device wishing to connect. Another possibility is that the PIN code must be entered to the both devices during the initialization. 4. KEY GENERATION AND INITIALIZATION The link s have to be generated and distributed among the Bluetooth units in order to be used in the authentication procedure. The exchange of the s takes place during an initialization phase which has to be carried out separately for each two units that want to implement authentication and encryption. All initialization procedures consist of the following five parts: generation of an initialization, generation of link, link exchange, authentication, generating of encryption in each unit.
3 After the initialization procedure, the units can proceed to communicate, or the link can be disconnected. If encryption is implemented, the E0 algorithm is used with the proper encryption derived from the current link. 4.1 Generation of an initialization The initialization is needed when two devices with no prior engagements need to communicate. During the initialization process, the PIN code is entered to both devices. The initialization itself is generated by the E22 algorithm shown in Fig. 4, which uses the PIN code, the length of the PIN code L and a 128 bits random number IN_RAND generated by the verifier device as inputs. IN_RAND 128 bits PIN 8L L <1;16> E 22 algorithm Fig. 4. Generation of an initialization K init K master When the initialization is generated, the PIN is augmented with the BD_ADDR. If one unit has a fixed PIN the BD_ADDR of the other unit is used. If both units have a variable PIN the BD_ADDR of the device that received IN_RAND is used. If both units have a fixed PIN they cannot be paired. 4.2 Generation of a unit The unit K A (K B ) is generated with the generating algorithm E21 (Fig. 5) when the Bluetooth device is in operation for the first time; i.e. not during each initialization. Once created, the unit is stored in non-volatile memory and is rarely changed. Another device can use the other device's unit as a link between these devices. During the initialization process, the application decides which party should provide its unit as the link. time. First, both of the units generate a random number. With the generating algorithm E21, both devices generate a, combining the random number RAND_A and RAND_B and their BT device addresses. After that, the two random numbers are exchanged securely by XORing with the current link and each unit recalculates the other unit contribution to the combination. This is possible since each unit knows the Bluetooth device address of the other unit. 4.4 Generation of a master The master is a temporary of the link s. It is generated by the master device by using the generating algorithm E22 with two 128-bit random numbers and L = 16. The reason to use the generating algorithm E22 in the first place is just to make sure the resulting random number is random enough. A third random number is then transmitted to the slave and with the generating algorithm and the current link an overlay is computed by both the master and the slave. The master is then sent to the slave, bitwise XORed with the overlay and slave can calculate the master. This procedure is then repeated for each slave who shall receive the new link. 4.5 Generation of the encryption The encryption KC is derived by E3 algorithm (Fig. 6) from the current link, a 96 bits Ciphering OFfset number (COF), and a 128 bits random number. The COF is determined in one of two ways. If the current link is a master, then COF is derived from the master BD_ADDR. Otherwise the value of COF is set to the value of Authenticated Ciphering Offset (ACO), which is generated during the authentication procedure. The encryption is automatically changed every time the Bluetooth device enters the encryption mode. IN_RAND 128 bits COF 96 bits E 3 algorithm 128 bits K C IN_RAND 128 bits E 21 algorithm Link Key 128 bits K A(B) Fig. 6. Generation of the encryption K AB BD_ADDR 48 bits 5. ENCRYPTION Fig. 5. Generation of a unit and a combination 4.3 Generation of a combination The combination is generated during the initialization process if the devices have decided to use one. It is generated by both devices at the same The Bluetooth encryption system encrypts the payloads of the packets; the access code and the packet header are never encrypted. Encryption is done with a stream cipher E0, which is re-synchronized for every new payload, which disrupt so-called correlation attacks. At each iteration, E0 generates a bit using four shift registers of differing lengths and two internal states, each 2 bits long. At each clock tick, the registers are shifted
4 and the two states are updated with the current state, the previous state and the values in the shift registers. Four bits are then extracted from the shift registers and added together. The algorithm XORs that sum with the value in the 2-bit register. The first bit of the result is output for the encoding. The E0 stream cipher system consists of the payload generator, the stream generator and the encryption/decryption part - Fig. 7. K C address clock RAND payload generator payload stream generator Fig. 7. Stream ciphering with E0 plain text cipher text Z cipher text plain text encryption/ decryption part Depending on whether a device uses a semi-permanent link (i.e. a combination or a unit ), or a master, there are several encryption modes available. If a unit or a combination is used, broadcast traffic is not encrypted. Individually addressed traffic can be either encrypted or not. If a master is used, there are three possible modes: mode 1, nothing is encrypted, mode 2, broadcast traffic is not encrypted, but the individually addressed traffic is encrypted with the master mode 3, all traffic is encrypted with the master. 6. AUTHENTICATION The Bluetooth authentication scheme uses a challenge response scheme in which a claimant s knowledge of a secret is checked through a 2-move protocol using symmetric secret s; a successful authentication is based on the fact that both participants share the same. As a side product, the ACO is computed and stored in both devices and is used for cipher generation later on. AU_RAND A BD_ADDR B E 1 Link Key Verifier (Unit A) Claimant (Unit B) SRES'? = SRES AU_RAND A SRES SRES Fig. 8. Authentication scheme in Bluetooth E 1 AU_RAND A BD_ADDR B Link Key First, the verifier sends the claimant a random number AU_RANDA to be authenticated. Then, both participants use the authentication function E1 with the random number, the claimants Bluetooth Device Address BD_ADDRB and the current link to get a response. The claimant sends the response SRES to the verifier, who then makes sure the responses match. Authentication scheme is shown in Fig. 8. When the authentication attempt fails, a certain waiting interval must pass before the verifier will initiate a new authentication attempt to the same claimant, or before it will respond to an authentication attempt initiated by a unit claiming the same identity as the suspicious unit. For each subsequent authentication failure with the same Bluetooth address, the waiting interval shall be increased exponentially. 7. PROBLEMS IN THE SECURITY The encryption scheme of Bluetooth has some serious weaknesses. The most important is a fact that E0 algorithm has flaw in the resynchronization mechanism and there were some investigation of conditional correlations in the Finite State Machine (FSM) governing the stream output of E0 (Lu, 2005) The best attack finds the original encryption for two-level E0 using the first 24 bits of frames and with 2 38 computations. The generation of the initialization is also a problem. The strength of the initialization is based on the used PIN code. The E22 initialization generation algorithm derives the from the PIN code, the length of the PIN code and a random number, which is transmitted over the air. When using 4 digit PIN codes there are only different possibilities; in fact most of the PINs are like Thus, the security of the initialization is quite low. The unique Bluetooth Device Address introduces another problem. When a connection is made that a certain Bluetooth device belongs to a certain person, it is easy to track and monitor the behaviour of this person. For instance, with the appropriate equipment (easy accessible) it is possible to track Bluetooth devices from more than mile away (Toms, 2005). The initial exchange takes place over an unencrypted link, so it is especially vulnerable because there is no such thing as a secure location anymore. Finally the well known Denial of Service (DoS) Attack. This nuisance is very simply; a constant request for response from a hacker s Bluetooth enabled computer to another Bluetooth enabled device such that it causes some temporary battery degradation in the receiving device. While occupying the Bluetooth link with invalid communication requests, the hacker can temporarily disable the product s Bluetooth services. 8. CONCLUSION Security aspects are very important for wireless technologies due to easy access of the attackers to the communication medium. Anyone with the
5 appropriate HW can scan radio communication, log it and use today s powerful computer performance to obtain sensitive information. Bluetooth has serious vulnerability due to E0 cryptographic algorithm. However even more secure algorithms, like AES-128 which seems to bee secure at present time, have side channels due to poor implementation of the algorithm in 32 bits processor (Bernstein, 2005). PAN technology is primary designed for devices based on 8 bits microcontrollers where the correct implementation without side channels will be even more challenging. ACKNOWLEDGEMENT This work was supported by the Centre of Applied Cybernetics and Brno University of Technology under the Project 1M0567, Ministry of Trade and Industry of the Czech Republic (FT-TA2/095), Grant agency of the Czech Republic (GA 102/03/1097, GA 102/05/0663 and GA 102/05/0467). REFERENCES SIG (1998). Official home page: IEEE (2002). Official home page: Toms Networking (2005). How to build a BlueSnipper Rifle. Bluetooth specification (2001). Version 1.1, February Lu, Y., W. Meier and S. Vaudenay (2005). The Conditional Correlation Attack. A Practical Attack on Bluetooth Encryption. Crypto'05, Santa Barbara, Aug 05, Bernstein D.J. Cache-timing attacks on AES. (2005) pdf
6
CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth
CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks
More informationT Cryptography and Data Security. Lecture 11 Bluetooth Security. Outline
T-79.4501 Cryptography and Data Security Lecture 11 Bluetooth Security Outline Security threats Objectives of Bluetooth security The Bluetooth Baseband security Pairing procedure Authentication/Encryption
More informationBluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002
Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),
More informationBluetooth. Bluetooth Radio
Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).
More informationSecuring A Bluetooth Device
Securing A Bluetooth Device Mrs. Dhanashri D. Dhokate 1, Mr. Milind C. Butale 2, Mr. Babasaheb S. Patil 3 Assistant Professor, Information Technology, PVPIT, Budhgaon, India 1. Associate Professor, Electronics
More informationSecurity of Wireless Networks in Intelligent Vehicle Systems
Security of Wireless Networks in Intelligent Vehicle Systems Syed M. Mahmud and Shobhit Shanker Electrical and Computer Engg. Dept. Wayne State University Detroit, MI 48202 Email: smahmud@eng.wayne.edu
More information[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]
2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the
More informationWireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design
Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended
More informationBluetooth. March 28, 2005 Patrick Lui
Bluetooth March 28, 2005 Patrick Lui 0053252 1. Introduction As our everyday lives move closer towards complete digital age, connectivity between devices is an important aspect that has not been emphasized
More informationAmarjeet Singh. February 7, 2012
Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website
More informationSecurity Analysis of Bluetooth v2.1 + EDR Pairing Authentication Protocol. John Jersin Jonathan Wheeler. CS259 Stanford University.
Security Analysis of Bluetooth v2.1 + EDR Pairing Authentication Protocol John Jersin Jonathan Wheeler CS259 Stanford University March 20, 2008 Version 1 Security Analysis of Bluetooth v2.1 + EDR Pairing
More informationSecurity. Nelli Gordon and Sean Vakili May 10 th 2011
Security Nelli Gordon and Sean Vakili May 10 th 2011 What is Bluetooth? Bluetooth is an open standard for short-range radio frequency (RF) communication. Bluetooth technology is used primarily to establish
More informationIntroduction to Bluetooth Wireless Technology
Introduction to Bluetooth Wireless Technology Jon Inouye Staff Software Engineer Mobile Platforms Group Intel Corporation Bluetooth Bluetooth is is a a trademark trademark owned owned by by Bluetooth Bluetooth
More informationTracing Bluetooth Headsets with the CATC Bluetooth Analysers
Enabling Global Connectivity Computer Access Technology Corporation Tel: (408) 727-6600, Fax: (408) 727-6622 www.catc.com Tracing Bluetooth Headsets with the CATC Bluetooth Analysers Application Note Introduction
More informationUpgrade of Bluetooth Encryption and Key Replay Attack
Upgrade of Bluetooth Encryption and Key Replay Attack Kaarle Ritvanen and Kaisa Nyberg Nokia Research Center Helsinki, Finland {kaarle.ritvanen,kaisa.nyberg}@nokia.com Abstract After adoption of the Advanced
More informationWireless Security Security problems in Wireless Networks
Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security
More informatione-pg Pathshala Quadrant 1 e-text
e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked
More informationLecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005
Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks
More informationSecurity Overview of Bluetooth
Security Overview of Bluetooth Dave Singelée, Bart Preneel COSIC Internal Report June, 2004 Abstract In this paper, we give a short overview of the security architecture of Bluetooth. We will especially
More informationHAI Network Communication Protocol Description
Home Automation, Inc. HAI Network Communication Protocol Description This document contains the intellectual property of Home Automation, Inc. (HAI). HAI authorizes the use of this information for the
More informationGuide to Wireless Communications, 3 rd Edition. Objectives
Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications
More information12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"
Mobile and Ubiquitous Computing Bluetooth Networking" George Roussos! g.roussos@dcs.bbk.ac.uk! Bluetooth Overview" A cable replacement technology! Operates in the unlicensed ISM band at 2.4 GHz! Frequency
More informationSensor Application for Museum Guidance
Sensor Application for Museum Guidance Radka Dimitrova a a TU,Dresden, Germany, e-mail: dimitrova@ifn.et.tu-dresden.de Abstract - This article examines the conditions for successful communication and power
More informationIntroduction to Wireless Networking ECE 401WN Spring 2009
I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range
More informationKey Management and Distribution
CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 10 Key Management; Other Public Key Cryptosystems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan
More informationCracking the Bluetooth PIN
Cracking the Bluetooth PIN Yaniv Shaked and Avishai Wool School of Electrical Engineering Systems Supported in part by a grant from Intel Corporation. Abstract: This paper describes the implementation
More informationIntroduction: Broadcom BCM943142HM Wireless Communication Device User's Guide
Introduction: Broadcom BCM943142HM Wireless Communication Device User's Guide Before you begin Things you should know BCM943142HM network Before you begin Obtain the following information from your network
More informationChapter 5. Wireless PANs
Chapter 5 Wireless PANs 5.1 Introduction Introduction of Wireless PANs (WPANs) has caused the latest revolution in the area of wireless technologies. WPANs are short to very short-range (from a couple
More informationPA RT 3 CROSS LAYER FUNCTIONS
PA RT 3 CROSS LAYER FUNCTIONS 16 Encryption and Security Cable based communication is inherently secure. However, since anyone could potentially listen into a wireless transmission, security is a key issue
More informationUnderstanding TETRA Security
Understanding TETRA Security Brian Murgatroyd Tetra Association former chairman Security and Fraud Prevention Group (SFPG) Warren Systems Independent Security Consultant brian@warrensystems.co.uk Agenda
More informationMaster. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3
/ Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationBluetooth. Basic idea
Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement of IrDA Embedded in other devices,
More informationUNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.
Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless
More informationSecurity in Ad-hoc Networks
1(12) Security in Ad-hoc Networks Anne Vanhala University of Helsinki Department of Computing Science Research seminar on Security in Distributed Systems anne.vanhala@sonera.com Abstract A short-range
More informationGLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017
GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,
More informationSIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas
SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS M. Subramani and M. Ilyas College of Engineering Florida Atlantic University Boca Raton, Florida 33431 {msubrama@cse.fau.edu, ilyas@fau.edu} Abstract Many
More informationBy Ambuj Varshney & Akshat Logar
By Ambuj Varshney & Akshat Logar Wireless operations permits services, such as long range communications, that are impossible or impractical to implement with the use of wires. The term is commonly used
More informationBluetooth: Short-range Wireless Communication
Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless
More informationWireless LAN Security. Gabriel Clothier
Wireless LAN Security Gabriel Clothier Timeline 1997: 802.11 standard released 1999: 802.11b released, WEP proposed [1] 2003: WiFi alliance certifies for WPA 2004: 802.11i released 2005: 802.11w task group
More informationComputer Networks II Advanced Features (T )
Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,
More informationObjectives of the Bluetooth Technology
Bluetooth Origin of the name Harald I Bleutooth (in Danish, Harald Blåtand) (b. c. 910 d. c. 987), king of Denmark was credited with the first unification of Denmark and Norway Ericsson, inspired on the
More informationSENETAS ENCRYPTION KEY MANAGEMENT STATE-OF-THE-ART KEY MANAGEMENT FOR ROBUST NETWORK SECURITY
SENETAS ENCRYPTION KEY MANAGEMENT STATE-OF-THE-ART KEY MANAGEMENT FOR ROBUST NETWORK SECURITY WHO SHOULD READ THIS DOCUMENT System Integrators, Cloud and Data Centre Service Providers, Layer 2 Data Networks
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationCryptography and Network Security Chapter 10. Fourth Edition by William Stallings
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Chapter 10 Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture out of the
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationThe Vulnerability Analysis and Improvement of the TETRA Authentication Protocol
The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol Abstract The TETRA system provides an authentication service which permits only the authorized terminal to access its network
More informationCompTIA FC0-U51. CompTIA IT Fundamentals.
CompTIA FC0-U51 CompTIA IT Fundamentals http://killexams.com/exam-detail/fc0-u51 or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access
More informationWiMAX Security: Problems & Solutions
(JCSCR) - ISSN 2227-328X WiMAX Security: Problems & Solutions Paul Semaan LACSC Lebanese Association for Computational Sciences Registered under No. 957, 2011, Beirut, Lebanon Abstract This paper is a
More informationCryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
More informationWireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved
Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks
More informationTELEPHONY CONTROL PROTOCOL SPECIFICATION
Part F:3 TELEPHONY CONTROL PROTOCOL SPECIFICATION TCS Binary This document describes the Bluetooth Telephony Control protocol Specification Binary (TCS Binary), using a bit-oriented protocol. This protocol
More informationSet Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers
Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers Objective A Virtual Private Network (VPN) is a private network that is used to virtually
More informationTinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE
More informationBASEBAND SPECIFICATION
Core System Package [Controller volume] Part B BASEBAND SPECIFICATION This document describes the specification of the Bluetooth link controller which carries out the baseband protocols and other lowlevel
More informationLogitech Advanced 2.4 GHz Technology With Unifying Technology
Logitech Advanced 2.4 GHz Technology Revision 070709 December 8, 2009 TABLE OF CONTENTS 1 INTRODUCTION: THE MOVE TO WIRELESS PERIPHERALS IN BUSINESS... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4
More informationL13. Reviews. Rocky K. C. Chang, April 10, 2015
L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing
More informationNetwork Security CHAPTER 31. Solutions to Review Questions and Exercises. Review Questions
CHAPTER 3 Network Security Solutions to Review Questions and Exercises Review Questions. A nonce is a large random number that is used only once to help distinguish a fresh authentication request from
More information1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class
1.264 Lecture 27 Security protocols Symmetric cryptography Next class: Anderson chapter 10. Exercise due after class 1 Exercise: hotel keys What is the protocol? What attacks are possible? Copy Cut and
More informationWireless Personal Area Networks & Wide Area Networks
Wireless Personal Area Networks & Wide Area Networks Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline In the lecture we will: Look at PAN s in more detail Look at example networks
More informationA Survey on Security Threats and Vulnerability attacks on Bluetooth Communication
A Survey on Security Threats and Vulnerability attacks on Bluetooth Communication Trishna Panse #, Prashant Panse * # Department of Information Technology, RGPV Sushila Devi Bansal College of Technology,
More informationNetwork Time Protocol
(NTP) is a protocol designed to time-synchronize a network of machines. NTP runs on User Datagram Protocol (UDP), which in turn runs on IP. NTP Version 3 is documented in RFC 1305. This module describes
More informationBy FaaDoOEngineers.com
ABSTRACT The seemingly endless entanglement of data wires connecting today s electronic devices has become slightly less jumbled with the introduction of Bluetooth technology and the creation of a wireless
More informationSecurity Issues in Mobile (Wireless) Ad Hoc Networking
Security Issues in Mobile (Wireless) Ad Hoc Networking Christopher Levari Department of Computing Macquarie University Sydney, NSW, Australia clevari@cox.net Abstract Technology and communication have
More informationBluetooth. The Bluetooth Vision. Universal Wireless Connectivity. Universal Wireless Connectivity
1 2 The Vision Universal wireless connectivity Replace existing cables with radio Connect systems that have been separate Ubiquitous computing environment Intelligent devices performing distributed services
More informationThe security of existing wireless networks
Security and Cooperation in Wireless Networks Cellular networks o o GSM UMTS WiFi LANs Bluetooth Security in Wireless Networks Wireless networks are more vulnerable to security issues: Broadcast communications
More informationPrincess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationPROTECTING CONVERSATIONS
PROTECTING CONVERSATIONS Basics of Encrypted Network Communications Naïve Conversations Captured messages could be read by anyone Cannot be sure who sent the message you are reading Basic Definitions Authentication
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More informationSecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine Security Policy Abstract: This document specifies Security Policy enforced by the SecureDoc Cryptographic Engine compliant with the requirements of FIPS 140-2
More informationTrust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks
Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks Han Sang Kim, Jin Wook Lee*, Sandeep K. S. Gupta and Yann-Hang Lee Department of Computer Science and Engineering Arizona
More informationBLUETOOTH PAN and external IP networks
BLUETOOTH PAN and external IP networks 1 Tore E. ]j1jnvik, 2Paal Engelstad & 2 Do van Thanh 1. Unik - University of Oslo - Norway - tlf: +47 90199176 - torejoen@iji.uio.no 2. Telenor R&D - Norway - tif:
More informationFederal Information Processing Standard (FIPS) What is it? Why should you care?
Federal Information Processing Standard (FIPS) 140-2 What is it? Why should you care? SECURITY IS BECOMING A GROWING CONCERN The migration from TDM to IP communication networks has drastically increased
More informationSensor Networks. Xueying Zhang, Howard M. Heys, and Cheng Li. Electrical and Computer Engineering. Faculty of Engineering and Applied Science
Energy Efficiency of Encryption Schemes Applied to Wireless Sensor Networks Xueying Zhang, Howard M. Heys, and Cheng Li Electrical and Computer Engineering Faculty of Engineering and Applied Science Memorial
More informationCapability based Command Security
Capability based Command Security SCSI commands standard proposal IBM Research Lab in Haifa February 2007 Table of Contents 1 General... 1 1.1 Overview...1 1.2 The Security Manager...2 1.3 Special Considerations...3
More informationCSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L
CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any
More informationCUBE-TYPE ALGEBRAIC ATTACKS ON WIRELESS ENCRYPTION PROTOCOLS
CUBE-TYPE ALGEBRAIC ATTACKS ON WIRELESS ENCRYPTION PROTOCOLS George W. Dinolt, James Bret Michael, Nikolaos Petrakos, Pantelimon Stanica Short-range (Bluetooth) and to so extent medium-range (WiFi) wireless
More informationWireless Personal Area Networks
CE 477 Wireless and obile Networks Wireless ersonal Area Networks Bluetooth CE 477 User cenarios Architecture rotocol tack IEEE 802.15.1 and IEEE 802.15.2 IEEE 802.15.4 (Low-Rate Wireless ersonal Area
More informationPlaintext Recovery Attacks Against WPA/TKIP
Plaintext Recovery Attacks Against WPA/TKIP Kenny Paterson, Bertram Poettering, Jacob Schuldt Royal Holloway, University of London! The 21st International Workshop on Fast Software Encryption March 4th,
More informationCryptography Functions
Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)
More information5 Tips to Fortify your Wireless Network
Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In
More informationData Encryption Standard (DES)
Data Encryption Standard (DES) Best-known symmetric cryptography method: DES 1973: Call for a public cryptographic algorithm standard for commercial purposes by the National Bureau of Standards Goals:
More informationFIPS SECURITY POLICY FOR
FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes
More informationIt is the process of sharing data, programs, and information between two or more computers.
1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet
More informationSecurity Architecture against Denial of Service Attacks in Wireless Mesh Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationSecurity Policy for FIPS KVL 3000 Plus
Security Policy for FIPS 140-2 KVL 3000 Plus Version 01.01.19 Motorola General Business Information 1 of 21 Motorola General Business Information 2 of 21 1 INTRODUCTION... 4 1.1 SCOPE... 4 1.2 OVERVIEW...
More informationBasic Communication Concepts
Chapter 3 Basic Communication Concepts 3.1 Introduction This chapter introduces some of the basic concepts of signals and information communication. The following section, 3.2, looks at some of the ways
More informationLOCK IT AND STILL LOSE IT ON THE (IN)SECURITY OF AUTOMOTIVE REMOTE KEYLESS ENTRY SYSTEMS
LOCK IT AND STILL LOSE IT ON THE (IN)SECURITY OF AUTOMOTIVE REMOTE KEYLESS ENTRY SYSTEMS FLAVIO GARCIA, DAVID OSWALD, TIMO KASPER, PIERRE PAVLIDES PRESENTED BY JACOB BEDNARD, WAYNE STATE UNIVERSITY CSC5991
More informationComputational Security, Stream and Block Cipher Functions
Computational Security, Stream and Block Cipher Functions 18 March 2019 Lecture 3 Most Slides Credits: Steve Zdancewic (UPenn) 18 March 2019 SE 425: Communication and Information Security 1 Topics for
More informationThe telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings.
Samsung C6112 telephone for protection of conversations against control via a GSM service provider as well as via active and semi-active GSM interception complexes, catchers. The telephone supports 2 SIM
More informationA network is two or more computers, or other electronic devices, connected together so that they can exchange data.
Computer Networks What is a Network? A network is two or more computers, or other electronic devices, connected together so that they can exchange data. For example; a network allows computers to share
More informationPass, No Record: An Android Password Manager
Pass, No Record: An Android Password Manager Alex Konradi, Samuel Yeom December 4, 2015 Abstract Pass, No Record is an Android password manager that allows users to securely retrieve passwords from a server
More informationSecurity. Communication security. System Security
Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security
More informationSEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9
SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9 Schweitzer Engineering Laboratories, Inc. May 21, 2007 Copyright 2005-2007 Schweitzer Engineering Laboratories, Inc. May be reproduced
More informationComputer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a
More informationNetwork Security and Cryptography. 2 September Marking Scheme
Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,
More information