Title:
Bluetooth security
Personal Author:
Series:
Artech House computer security series
Publication Information:
Boston : Artech House, 2004
ISBN:
9781580535045
Subject Term:
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000004735720 | TK5103.3 G43 2004 | Open Access Book | Book | Searching... |
Searching... | 30000010178925 | TK5103.3 G43 2004 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Bluetooth technology is becoming a popular way to furnish short-range wireless interconnectivity as an alternative to existing wire applications or as an enabling technology for new ones. With the number of Bluetooth-equipped consumer and industry devices rapidly increasing, it stands on the threshold of global deployment. This first of its kind book, from expert authors actively contributing to the evolution of Bluetooth, provides an overview and detailed description of all the security functions and features of this technology's latest core release.
Author Notes
Ben Smeets is an Ericsson expert in security systems and data compression at Ericsson Mobile Platforms AB.
Table of Contents
Preface | p. xi |
Part I Bluetooth Security Basics | p. 1 |
1 Introduction | p. 3 |
1.1 Bluetooth system basics | p. 3 |
1.1.1 Background | p. 3 |
1.1.2 Trade-offs | p. 4 |
1.1.3 Bluetooth protocol stack | p. 4 |
1.1.4 Physical layer | p. 6 |
1.1.5 Baseband | p. 7 |
1.1.6 Link manager protocol | p. 13 |
1.1.7 Logical link control and adaptation protocol | p. 15 |
1.1.8 Host control interface | p. 15 |
1.1.9 Profiles | p. 17 |
1.2 Bluetooth security basics | p. 19 |
1.2.1 User scenarios | p. 19 |
1.2.2 Notions and terminology | p. 22 |
References | p. 25 |
2 Overview of the Bluetooth Security Architecture | p. 27 |
2.1 Key types | p. 27 |
2.2 Pairing and user interaction | p. 29 |
2.3 Authentication | p. 30 |
2.4 Link privacy | p. 31 |
2.4.1 Protect the link | p. 32 |
2.4.2 Encryption algorithm | p. 32 |
2.4.3 Mode of operation | p. 34 |
2.4.4 Unicast and broadcast | p. 36 |
2.5 Communication security policies | p. 37 |
2.5.1 Security modes | p. 38 |
2.5.2 Security policy management | p. 42 |
References | p. 42 |
3 Bluetooth Pairing and Key Management | p. 43 |
3.1 Pairing in Bluetooth | p. 43 |
3.2 HCI protocol | p. 44 |
3.3 LM protocol | p. 45 |
3.4 Baseband events | p. 46 |
3.4.1 Initialization key generation | p. 47 |
3.4.2 Unit key generation | p. 47 |
3.4.3 Combination key generation | p. 49 |
3.4.4 Authentication | p. 50 |
3.4.5 Master key generation | p. 52 |
3.5 User interaction | p. 53 |
3.6 Cipher key generation | p. 54 |
3.6.1 Encryption key K[subscript C] | p. 54 |
3.6.2 Constraint key K'[subscript C] | p. 55 |
3.6.3 Payload key K[subscript P] | p. 57 |
3.7 Key databases | p. 58 |
3.7.1 Unit keys generation requirements | p. 58 |
3.7.2 Combination key generation requirements | p. 58 |
3.7.3 Key databases | p. 60 |
3.7.4 Semipermanent keys for temporary use | p. 63 |
References | p. 63 |
4 Algorithms | p. 65 |
4.1 Crypto algorithm selection | p. 65 |
4.1.1 Block ciphers | p. 65 |
4.1.2 Stream ciphers | p. 66 |
4.2 SAFER+ | p. 67 |
4.2.1 Authentication algorithm E[subscript 1] | p. 70 |
4.2.2 Unit key algorithm E[subscript 21] | p. 71 |
4.2.3 Initial key algorithm E[subscript 22] | p. 72 |
4.2.4 Encryption key algorithm E[subscript 3] | p. 73 |
4.3 Encryption engine | p. 73 |
4.4 Ciphering algorithm E[subscript 0] | p. 74 |
4.4.1 Initialization | p. 77 |
4.5 Implementation aspects | p. 79 |
References | p. 80 |
5 Broadcast Encryption | p. 81 |
5.1 Overview | p. 81 |
5.2 Preparing for broadcast encryption | p. 82 |
5.3 Switching to broadcast encryption | p. 83 |
References | p. 85 |
6 Security Policies and Access Control | p. 87 |
6.1 Objectives | p. 87 |
6.1.1 Trust relations | p. 88 |
6.1.2 Security levels | p. 88 |
6.1.3 Flexibility | p. 89 |
6.1.4 Implementation considerations | p. 89 |
6.2 Security manager architecture | p. 90 |
6.2.1 Overview | p. 90 |
6.2.2 Device trust level | p. 91 |
6.2.3 Security level for services | p. 92 |
6.2.4 Connection setup | p. 92 |
6.2.5 Database contents and registration procedure | p. 95 |
Reference | p. 96 |
7 Attacks, Strengths, and Weaknesses | p. 97 |
7.1 Eavesdropping | p. 97 |
7.2 Impersonation | p. 105 |
7.3 Pairing | p. 107 |
7.4 Improper key storage | p. 109 |
7.4.1 Disclosure of keys | p. 110 |
7.4.2 Tampering with keys | p. 111 |
7.4.3 Denial of service | p. 111 |
7.5 Unit key | p. 112 |
7.6 Location tracking | p. 113 |
7.6.1 Bluetooth device address and location tracking | p. 113 |
7.6.2 Five different types of location tracking attacks | p. 115 |
7.7 Implementation flaws | p. 116 |
References | p. 117 |
Part II Bluetooth Security Enhancements | p. 121 |
8 Providing Anonymity | p. 123 |
8.1 Overview of the anonymity mode | p. 123 |
8.2 Address usage | p. 124 |
8.2.1 The fixed device address, BD_ADDR_fixed | p. 124 |
8.2.2 The active device address, BD_ADDR | p. 125 |
8.2.3 Alias addresses, BD_ADDR_alias | p. 128 |
8.3 Modes of operation | p. 128 |
8.4 Inquiry and paging | p. 129 |
8.4.1 Connectable mode | p. 129 |
8.4.2 Private connectable mode | p. 130 |
8.4.3 General connectable mode | p. 131 |
8.5 Alias authentication | p. 131 |
8.6 Pairing | p. 133 |
8.7 Anonymity mode LMP commands | p. 133 |
8.7.1 Address update, LMP active address | p. 134 |
8.7.2 Alias address exchange, LMP alias address | p. 134 |
8.7.3 Fixed address exchange, LMP fixed address | p. 135 |
8.8 Pairing example | p. 136 |
References | p. 138 |
9 Key Management Extensions | p. 139 |
9.1 Improved pairing | p. 140 |
9.1.1 Requirements on an improved pairing protocol | p. 140 |
9.1.2 Improved pairing protocol | p. 141 |
9.1.3 Implementation aspects and complexity | p. 147 |
9.2 Higher layer key exchange | p. 149 |
9.2.1 IEEE 802.1x port-based network access control | p. 150 |
9.2.2 Higher layer key exchange with EAP TLS | p. 152 |
9.3 Autonomous trust delegation | p. 154 |
9.3.1 Security group extension method | p. 154 |
9.3.2 Public key-based key management | p. 160 |
9.3.3 Group extension method versus public key method | p. 163 |
References | p. 164 |
10 Security for Bluetooth Applications | p. 167 |
10.1 Headset | p. 168 |
10.1.1 Headset security model | p. 168 |
10.1.2 Pass-key and key management | p. 169 |
10.1.3 Example | p. 171 |
10.2 Network access | p. 173 |
10.2.1 Common access keys | p. 174 |
10.2.2 Security architecture | p. 175 |
10.2.3 Network service subscription | p. 175 |
10.2.4 Initial connection | p. 177 |
10.2.5 Subsequent access to NAcPs | p. 179 |
10.3 SIM access | p. 181 |
10.3.1 The SIM access profile | p. 181 |
10.3.2 Securing SIM access | p. 182 |
References | p. 184 |
Glossary | p. 187 |
List of Acronyms and Abbreviations | p. 189 |
About the Authors | p. 195 |
Index | p. 197 |