Bluetooth Security
Bluetooth Security
By Scott Anson
Agenda
Security terminology.
Overview of the architecture
pertaining to security.
Description of the various modes
of security available.
Closer look at link-level security
Issues with Bluetooth security.
Security Threats
Disclosure Threat: leaking of
information from a system to an
unwanted party. Confidentiality
violation.
Integrity Threat: unauthorized
changes of information during
transmission.
Denial of Service Threat:
resources blocked by malicious
attacker. Availablity violation.
Terms
Authentication: process of
determining the identity of another
user.
Authorization: process of deciding
if device A has the access rights to
device B. Notion of “trusted”
Symmetric Key Security:
generally, A trusts B if B can prove
that it has the same shared key
that A does.
Wireless Versus Traditional
Security
There is no centralized, trusted
third party for a wireless network
User Authentication becomes
harder
Authentication must go across a
B lu e to o th a n d IE E E S tru c tu re
7 A p p lic a tio n X .4 0 0 a n d X .50 0 E M A IL
6 P re s en ta tio n
5 S es sion
4 T ra ns p ort T ra n s p o rt C o n tro l P ro to c o l (T C P )
3 N e tw o rk In te rn e t P ro to c o l (IP )
B lu e to o th IS O O S I IE E E 8 0 2
L a y e rs S ta n d a rd s
Data Word
Linear-Feedback
Shift Register
XOR Decrypted Word
Encrypted Word
Encryption in detail.
Key = E3( COF, RAND, LinkKey). Variable
size design due to internationalization
issues
COF: Ciphering Offset Number,
determined by type of link key:
1. Combination/Unit Link Key: equal to ACU
from initialization This was obtained
during the initialization key generation
process and saved in the Security
Manager.
2. Master Link Key: Concatenation of the
master BD_ADDR and the slave BD_ADDR
Wrap up: Bluetooth Keys
Encryption Key is not a Link Key but is derived
from either the Unit, Combination, or Master Key.
Can be shorter than the 128-bit link keys.
4 Link Keys:
Ki : initialization key, protects initialization
parameters. Formed from combo of RAND, PIN,
and BD_ADDR. This is discarded after channel
establishment, at which point the others are used.
Kab: combination key, derived from paired
devices when additional security needed.
Memory? Device that has the most has to store
the combo key.
Link Key wrap-up
continued
Ku: unit key, generated in installation of a device,
stored in nonvolatile memory. Unit and combo keys
generated with the same function, different inputs.
Unit Key cannot change! If it does, then the entire
piconet is compromised and must be re-initialized
Km: master key, used when the master
device wants to transmit to multiple devices at
once. Overrides current link keys for one
session.
Master Key is the most typical link key, but for
scatternet communication (multiple masters),
the unit key or combination key is always used.
General Problems
Device versus User authentication.
Bluetooth authenticates devices, not
users. This is not always appropriate.
Depends on app-specific fixes.
Device versus Service specific security.
You must implement the same security
policy (mode) on all services on the
device.
Dependence on addresses, shared keys.
Fixed PINs also pose a problem.
General problems continued
Legacy applications do not use the
Service Manager (need adapter kits).
Cannot enforce unidirectional traffic
Once connection established,
assumed permanently secure.
(unless called by Master to
renegotiate, which rarely occurs in
most implementations.)
Specific Problems
PIN number is the only truly secret key, and
this is up to the user. 0000 is not good!
Solution: force longer pins, combo of entered
pin and stored pin
Battery draining denial of service attack!
Spoofing due to shared keys: A talks to B,
over. Then A talks to C. Now B can
masquerade as A to C by faking A’s device
address, and can then lay off and eavesdrop.
Privacy issues? Device’s unique address is
associated with a user.
Conclusions
Inadequate for serious security:
money transfers. Better: WLAN
Additional security must be added at
the higher layers. This keeps
Bluetooth an economical solution to
non-security-critical interactions.
Most hackers don’t want to sit
nearby. Bluetooth works great for
PANs.
Security By Obscursion! Not elegant.
References
THE SPEC:
http://www.bluetooth.com/pdf/Bluetooth_11_Specifica
tions_Book.pdf
Träskbäck M, Security in Bluetooth: An overview of
Bluetooth security, 2000-11-2
http://www.cs.hut.fi/Opinnot/Tik86.174/Bluetooth_Sec
urity.pdf
Vainio J., Bluetooth Security, 2000-05-25
http://www.niksula.cs.hut.fi/~jiitv/bluesec.html
Knowledge Base on Bluetooth:
http://www.palowireless.com/infotooth/knowbase.asp
References continued…
Cathal McDaid:
http://www.palowireless.com/bluearticles/cc1_security1.asp
http://www.palowireless.com/bluearticles/cc2_security2.asp
http://www.palowireless.com/bluearticles/cc2_security3.asp
Saarinen M-J, A Software Implementation of the BlueTooth
Encryption Algorithm E0; http://www.cc.jyu.fi/~mjos/e0.c
www.xilinx.com tutorials on both Bluetooth Overview and
Close up on Bluetooth Security
www.bluetooth.com
Other bluetooth links: http://www.practicallynetworked
.com/tools/wireless_articles.htm#Bluetooth
http://www.geocities.com has links to bluetooth tutorials