Professional Documents
Culture Documents
Bluetooth Security Considerations: Seminar by Anoop Aravind
Bluetooth Security Considerations: Seminar by Anoop Aravind
Bluetooth Security Considerations: Seminar by Anoop Aravind
CONSIDERATIONS
SEMINAR BY
ANOOP ARAVIND
INTRODUCTION
• Bluetooth is a packet based protocol. IT is an open wireless
technology standard for exchanging data over short
distances.
Bluetooth uses radio technology called frequency hopping
spread spectrum.
The two devices wanting to establish contact must agree the size of encryption key to use.
SECURITY CONSIDERATIONS
Authentication: verifying the identity of communicating devices. User
authentication is not provided natively by Bluetooth.
Link key:
There are four link keys to cover the different applications
it is used for. They are :
The storage of KA requires little memory space and is often used when device has little
memory or when the device should be accessible to a large
group of users.
2) Combination key, KAB, is derived from two units A and B.
This key is generated for each pair of devices and is used
when more security is needed.
The purpose of separating the authentication key and encryption key is to facilitate the use of a shorter encryption key without weakening the strength of the authentication procedure .
PIN code
This is a number, which can be fixed or selected by the
user.
The length is usually 4 digits, but it can be anything
between 1 to 16 octets.