Preview

Attacks On Bluetooth Devices

Powerful Essays
Open Document
Open Document
935 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Attacks On Bluetooth Devices
Toshendra Sharma, 113050013
Saptarshi Sarkar, 113050044
Pankaj Vanwari, 114058001
Under guidance of:
Prof. Bernard Menezes

Outline
 Bluetooth history
 Bluetooth Protocol
 Layers in Bluetooth
 Security in Bluetooth
 Vulnerabilities
 Attacks/Exploits
 Demonstration

Bluetooth Technology
 proprietary open wireless technology standard for

exchanging data over short distances
 was originally conceived as a wireless alternative to RS232 data cables
 It uses short wave length radio transmission in ISM band from 2400-2480 MHz

Benefits of Bluetooth Technology
 Cable replacement
 Ease of file sharing
 Wireless synchronization
 Internet connectivity

Implementation
 frequency hopping spread spectrum
 chops up the data being sent and transmits chunks of

it up to 79 bands
 Packet Based Protocol with a Master-Slave
Structure
 Piconet
 A piconet is an ad-hoc computer network which used to

link group of devices, where protocols allow one master device to interconnect with up to seven active slaves

Bluetooth Profiles
 Bluetooth Profile is a specification regarding an aspect

of Bluetooth based wireless communication between devices Bluetooth Architecture
 two specifications:
 the core and
 the profile specifications
 The core specification discusses how the technology

works
 profile specification focuses on how to build interoperating devices using the core technologies

Bluetooth Protocol
 Bluetooth Controller
 Bluetooth Host
 The physical links are created on the basis of

masters/slaves

Typical
Scatternet

Layers in bluetooth

Device Address (BD_ADDR)

 NAP: Nonsignificant Address Part
 UAP: Upper Address Part
 LAP: Lower Address Part

Bluetooth Security
 Authentication
 Confidentiality
 Authorization

 Security Modes
 Non-secure
 Service level enforced security
 Link level enforced security

Authentication
 Step 1. The verifier transmits a 128-bit random

challenge (AU_RAND) to the claimant.
 Step 2. The claimant uses

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Watch the Demo Lab in Learning Space Unit 2 and then answer each of the following questions.…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    NETW471 Course Project

    • 2998 Words
    • 9 Pages

    Blue-tooth is a great emerging technology being used today, which also has potential for much more uses than the tradition bluetooth headset. Bluetooth connects gadgets together, helping users listen to music, talk on phones without having to deal with frustrating cords and wires. To understand how a Bluetooth connection works, I will use an example such as a phone connected to wireless speaker. First, each device is equipped with Bluetooth connectivity, a feature that requires both software and hardware components. On the hardware side, an antenna-equipped chip in both devices sends and receives signals at a specific frequency. The software interprets incoming Bluetooth signals and sends them out in ways other devices can read and understand. In the case of the wireless speaker, the phone will know how to send audio files and information in a format that the speaker understands, while the speaker can interpret these signals–as well as other indicators such as volume and track controls–from the phone.…

    • 2998 Words
    • 9 Pages
    Better Essays
  • Good Essays

    IS3230 Lab 4

    • 528 Words
    • 2 Pages

    6. WLAN such as wireless A, B, or G is commonly used for networking computers wirelessly and Bluetooth is a trademarked communications protocol initially designed for wireless keyboards and mice but now most commonly used for wireless cell phone headsets.…

    • 528 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Week 4 Lab Part 1: Network Traffic Analysis and Baseline Definition & Secure WLAN Solution…

    • 2612 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN).…

    • 920 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Carphone Cyber Attack

    • 221 Words
    • 1 Page

    2.4 million customers may have been affected in a "sophisticated cyber attack" on a division mobile phone retailer Carphone Warehouse last week. The cyber attack was discovered on 5th August after reportedly happening for up to two weeks prior. In a statement on their website, Dixons Carphone, who own Carphone Warhouse, admitted the information accessed included names, addresses, birth dates and bank details, and that 90,000 pieces of encrypted credit card data may also have been compromised.…

    • 221 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Today’s advances in physical security are just temporary because criminals are learning ways to get around these systems. By always upgrading and…

    • 3592 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Financial institutions should actively monitor and notify security alert organizations for notices related to their wireless application services.…

    • 1375 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Not only would Apple’s main policy of privacy be violated if they let the FBI hack into Farook’s phone, but it would have damaged the company and our rights all together. “Basic American rights were at stake, and the purpose of the law is to protect people’s rights” (“PRO/CON: Should Apple have resisted FBI pressure to hack an iPhone?” Newsela). Technically, Apple has a right to refuse the orders of the FBI that reflects their company in a negative way. If Apple would have accepted the order of the FBI, our rights as Americans would have been at risk. Moreover, not only would our rights as Americans be at risk, the entire company could have been damaged because of what the law was asking for. “The FBI did not ask Apple to turn over information…

    • 249 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    In an article from the Washington Post, it is implied that there is no personal privacy within our technological world. Craig Timberg’s article, “Cellphones Used As Secret Trackers” startles the smartphone users of our society by revealing that their location can be found and tracked by anyone at anytime. This reminds me of the novel 1984 by George Orwell, in which privacy is nonexistent. There is an incredibly strict control of the people within this dystopian society and with the use of electronics, privacy can no longer survive. A notable quote from the book helps to describe the type of world the people live in, “If you want to keep a secret, you must also hide it from yourself” (Orwell 37). While it is great that our technology is advancing,…

    • 296 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    With the rise in popularity of Wi-Fi and Bluetooth technology embedded into smartphones, it has gained the attention of hackers out to gather information as another way to get into a system. Bluetooth technology is a very small area networking device, meaning that it can communicate wirelessly to other Bluetooth devices in the vicinity of 25-30 feet. But that also means that any hacker with that same technology can gain entry into a smartphone and wreak havoc that way. Any information stored on that phone is now available to them to take and do with as they please. The only disadvantage to a hacker using Bluetooth is that they have to be within range, so they typically target large crowds of people if they are going to use that transmission medium to gather information.…

    • 913 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Introduction A network that allows two wireless devices to communicate with the help of other wireless devices that lie within range of each other. Challenges Lack of resources The absence of a central node High mobility Different devices and platforms Leads to Key distribution problem Coping with attacks What model to use…

    • 701 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bluetooth

    • 2028 Words
    • 9 Pages

    Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecom vendor Ericsson in 1994, it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization.…

    • 2028 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Data Security is primary concern for every communication system. There are many ways to provide security data that is being communicated. However, what if the security is assured irrespective of the hackers are from the noise. This Project describes a design of effective security for data communication by designing standard algorithm for encryption and decryption. R.F. is a PAN technology based on the IEEE 802.15.4 standard. Unlike Bluetooth or wireless USB devices, R.F. devices have the ability to form a mesh network between nodes. Meshing is a type of daisy chaining from one device to another. This technique allows the short range of an individual node to be expanded and multiplied, covering a much larger area. The source information is generated by a key pad and this will be encrypted and is sent to destination through R.F. modules. The receiving system will check the data and decrypt according to a specific algorithm and displays on the LCD.This project uses regulated 5V, 500mA power supply. 7805 three terminal voltage regulator is used for voltage regulation. Bridge type full wave rectifier is used to rectify the ac output of secondary of 230/12V step down transformer.…

    • 1101 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Androids Under Attacks

    • 1225 Words
    • 5 Pages

    Android & Co started in 1913 when Arthur and Clarence, both from the audit firm of Price bought out a small audit firm in Illinois to form Arthur, Clarence & Co, which became Androids & Co in 1918. Android headed the firm of Androids & Co until his death in 1945.Besides, Android who is founder of Androids & Co was a zealous supporter of high standards in the accounting industry. In 1945, Leonardo Sparky, who succeeded Android at the founder’s death, continued this emphasis on honesty. For many years, the Android’s motto was “Think Straight, Talk Straight”.…

    • 1225 Words
    • 5 Pages
    Better Essays

Related Topics