Identifying and Assessing Security Issues related to Bluetooth Wireless Networks

advertisement
1
Identifying and Assessing
Security Issues related to
Bluetooth Wireless
Networks
Gregory Lamm
Jorge Estrada
Gerlando Falauto
Jag Gadiyaram
November 29, 2000
University of Virginia
A Christmas Carol
2
Charles Dickens had it right-for every
major issue (or story) in the world, there
is usually a Past, a Present and a
Future that are clearly identifiable.
Group 11 would like to tell you a story.
University of Virginia
3
The Ghost of Bluetooth
Past
• 10th Century Danish King (unified
warring Viking Tribes): Harald Bluetooth
• No Wireless Networks prior to 20th
Century
• New Wireless Transmission Schemes
for the 21st Century
– 802.11b
– Home Radio Frequency
– Bluetooth (version 1.0)
University of Virginia
Past Bluetooth Attacks
4
1. Third Party Eavesdropping & Impersonating
A
C
B
2. Stealing Addresses from a Bluetooth Device
 Tracking the device through the network
 Impersonate a device
University of Virginia
5
The Ghost of Bluetooth
Present
•
•
•
•
•
•
•
Ad hoc Networks
Bluetooth Chip: $50
Range: 10 meters (30 feet)
Throughput: 720,000 bps
Peer to Peer
Piconet (8/250)
Scatternet (10 Piconets)
University of Virginia
Bluetooth
6
(Special Interest Group)
1,900 Bluetooth
Technology Manufactures
University of Virginia
Bluetooth Applications
7
University of Virginia
Bluetooth Development
8
Local Area
Network
(LAN)
• Small Network
• Large Throughput
• IR or Radio Communication
• Relays not used
• Fixed with limited mobility
• Small Distances
Wireless
Phone
Network
• Large Network
• Small Throughput
• Radio Communication
• Relays used
• Mobility
• Large Distances
University of Virginia
Bluetooth Overview
9
Local Area
Network
(LAN)
Wireless
Phone
Network
• Radio Frequency Hopping
(1600 Hps)
Communication • 2.4GHz Frequency Range
• RF Interface
• 720 Kbps – 4 Mbps
• Challenge-Response
Scheme
Authentication • SAFER+
• None/One-way/Mutual
• Needed for encryption
Encryption
• Optional
• Symmetric Stream Cipher
• Negotiable Key Size (8-128 bits)
• Clock dependent
University of Virginia
Bluetooth Communication
10
• Radio Frequency
Communications (RF C)
– Controls Frequency Hopping
for Bluetooth
• Logical Link Control (LLC)
– Link Management
– Security Management
– QoS Management
– Transmission Scheduling
• Link Manager Protocol (LMP)
– Configure, authenticate and
handle the connections
– Power management scheme
University of Virginia
Bluetooth Authentication
11
PIN
Random #
Link key generation
KLINK
A (Verifier)
BD_ADDRB
KLINK
AU_RAND
CHECK
SRES = SRES’
BD_ADDRB
E1
(SAFER+)
BD_ADDRB
KLINK
AU_RAND
B (Claimant)
E1
(SAFER+)
AU_RAND
SRES’ ACO’
SRES ACO
SRES’
Encryption key generation
University of Virginia
Bluetooth Encryption
12
A
BD_ADDRA
clockA
KC’
B
Is everything OK?
BD_ADDR
E Yes, BUT... clock
K’
A
A
0
C’
K’cipher
Kcipher
K’cipher
Kcipher
dataA-B
dataA-B
Kcipher
dataB-A
E0
data
=
K’cipher
dataB-A
University of Virginia
13
The Ghost of Bluetooth
Future
Security Weaknesses
• Encryption
– Plain Text Attack
• Authentication
– Unit Key Stealing
• Communication
– Impersonation
University of Virginia
Bluetooth Applications
14
University of Virginia
Conclusions
15
• As Viking Hackers, we believe that Bluetooth
has some vulnerabilities and some increased
security measures are needed.
Security
Functionality
University of Virginia
Download