Cover image for Bluetooth security
Title:
Bluetooth security
Personal Author:
Series:
Artech House computer security series
Publication Information:
Boston : Artech House, 2004
ISBN:
9781580535045

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004735720 TK5103.3 G43 2004 Open Access Book Book
Searching...
Searching...
30000010178925 TK5103.3 G43 2004 Open Access Book Book
Searching...

On Order

Summary

Summary

Bluetooth technology is becoming a popular way to furnish short-range wireless interconnectivity as an alternative to existing wire applications or as an enabling technology for new ones. With the number of Bluetooth-equipped consumer and industry devices rapidly increasing, it stands on the threshold of global deployment. This first of its kind book, from expert authors actively contributing to the evolution of Bluetooth, provides an overview and detailed description of all the security functions and features of this technology's latest core release.


Author Notes

Ben Smeets is an Ericsson expert in security systems and data compression at Ericsson Mobile Platforms AB.


Table of Contents

Prefacep. xi
Part I Bluetooth Security Basicsp. 1
1 Introductionp. 3
1.1 Bluetooth system basicsp. 3
1.1.1 Backgroundp. 3
1.1.2 Trade-offsp. 4
1.1.3 Bluetooth protocol stackp. 4
1.1.4 Physical layerp. 6
1.1.5 Basebandp. 7
1.1.6 Link manager protocolp. 13
1.1.7 Logical link control and adaptation protocolp. 15
1.1.8 Host control interfacep. 15
1.1.9 Profilesp. 17
1.2 Bluetooth security basicsp. 19
1.2.1 User scenariosp. 19
1.2.2 Notions and terminologyp. 22
Referencesp. 25
2 Overview of the Bluetooth Security Architecturep. 27
2.1 Key typesp. 27
2.2 Pairing and user interactionp. 29
2.3 Authenticationp. 30
2.4 Link privacyp. 31
2.4.1 Protect the linkp. 32
2.4.2 Encryption algorithmp. 32
2.4.3 Mode of operationp. 34
2.4.4 Unicast and broadcastp. 36
2.5 Communication security policiesp. 37
2.5.1 Security modesp. 38
2.5.2 Security policy managementp. 42
Referencesp. 42
3 Bluetooth Pairing and Key Managementp. 43
3.1 Pairing in Bluetoothp. 43
3.2 HCI protocolp. 44
3.3 LM protocolp. 45
3.4 Baseband eventsp. 46
3.4.1 Initialization key generationp. 47
3.4.2 Unit key generationp. 47
3.4.3 Combination key generationp. 49
3.4.4 Authenticationp. 50
3.4.5 Master key generationp. 52
3.5 User interactionp. 53
3.6 Cipher key generationp. 54
3.6.1 Encryption key K[subscript C]p. 54
3.6.2 Constraint key K'[subscript C]p. 55
3.6.3 Payload key K[subscript P]p. 57
3.7 Key databasesp. 58
3.7.1 Unit keys generation requirementsp. 58
3.7.2 Combination key generation requirementsp. 58
3.7.3 Key databasesp. 60
3.7.4 Semipermanent keys for temporary usep. 63
Referencesp. 63
4 Algorithmsp. 65
4.1 Crypto algorithm selectionp. 65
4.1.1 Block ciphersp. 65
4.1.2 Stream ciphersp. 66
4.2 SAFER+p. 67
4.2.1 Authentication algorithm E[subscript 1]p. 70
4.2.2 Unit key algorithm E[subscript 21]p. 71
4.2.3 Initial key algorithm E[subscript 22]p. 72
4.2.4 Encryption key algorithm E[subscript 3]p. 73
4.3 Encryption enginep. 73
4.4 Ciphering algorithm E[subscript 0]p. 74
4.4.1 Initializationp. 77
4.5 Implementation aspectsp. 79
Referencesp. 80
5 Broadcast Encryptionp. 81
5.1 Overviewp. 81
5.2 Preparing for broadcast encryptionp. 82
5.3 Switching to broadcast encryptionp. 83
Referencesp. 85
6 Security Policies and Access Controlp. 87
6.1 Objectivesp. 87
6.1.1 Trust relationsp. 88
6.1.2 Security levelsp. 88
6.1.3 Flexibilityp. 89
6.1.4 Implementation considerationsp. 89
6.2 Security manager architecturep. 90
6.2.1 Overviewp. 90
6.2.2 Device trust levelp. 91
6.2.3 Security level for servicesp. 92
6.2.4 Connection setupp. 92
6.2.5 Database contents and registration procedurep. 95
Referencep. 96
7 Attacks, Strengths, and Weaknessesp. 97
7.1 Eavesdroppingp. 97
7.2 Impersonationp. 105
7.3 Pairingp. 107
7.4 Improper key storagep. 109
7.4.1 Disclosure of keysp. 110
7.4.2 Tampering with keysp. 111
7.4.3 Denial of servicep. 111
7.5 Unit keyp. 112
7.6 Location trackingp. 113
7.6.1 Bluetooth device address and location trackingp. 113
7.6.2 Five different types of location tracking attacksp. 115
7.7 Implementation flawsp. 116
Referencesp. 117
Part II Bluetooth Security Enhancementsp. 121
8 Providing Anonymityp. 123
8.1 Overview of the anonymity modep. 123
8.2 Address usagep. 124
8.2.1 The fixed device address, BD_ADDR_fixedp. 124
8.2.2 The active device address, BD_ADDRp. 125
8.2.3 Alias addresses, BD_ADDR_aliasp. 128
8.3 Modes of operationp. 128
8.4 Inquiry and pagingp. 129
8.4.1 Connectable modep. 129
8.4.2 Private connectable modep. 130
8.4.3 General connectable modep. 131
8.5 Alias authenticationp. 131
8.6 Pairingp. 133
8.7 Anonymity mode LMP commandsp. 133
8.7.1 Address update, LMP active addressp. 134
8.7.2 Alias address exchange, LMP alias addressp. 134
8.7.3 Fixed address exchange, LMP fixed addressp. 135
8.8 Pairing examplep. 136
Referencesp. 138
9 Key Management Extensionsp. 139
9.1 Improved pairingp. 140
9.1.1 Requirements on an improved pairing protocolp. 140
9.1.2 Improved pairing protocolp. 141
9.1.3 Implementation aspects and complexityp. 147
9.2 Higher layer key exchangep. 149
9.2.1 IEEE 802.1x port-based network access controlp. 150
9.2.2 Higher layer key exchange with EAP TLSp. 152
9.3 Autonomous trust delegationp. 154
9.3.1 Security group extension methodp. 154
9.3.2 Public key-based key managementp. 160
9.3.3 Group extension method versus public key methodp. 163
Referencesp. 164
10 Security for Bluetooth Applicationsp. 167
10.1 Headsetp. 168
10.1.1 Headset security modelp. 168
10.1.2 Pass-key and key managementp. 169
10.1.3 Examplep. 171
10.2 Network accessp. 173
10.2.1 Common access keysp. 174
10.2.2 Security architecturep. 175
10.2.3 Network service subscriptionp. 175
10.2.4 Initial connectionp. 177
10.2.5 Subsequent access to NAcPsp. 179
10.3 SIM accessp. 181
10.3.1 The SIM access profilep. 181
10.3.2 Securing SIM accessp. 182
Referencesp. 184
Glossaryp. 187
List of Acronyms and Abbreviationsp. 189
About the Authorsp. 195
Indexp. 197