Professional Documents
Culture Documents
Security in Wireless Personal Area Network (WPAN) : Chapter-14 (Text Book) Lecture 34-Lecture-35 Dr. Rahul Saha
Security in Wireless Personal Area Network (WPAN) : Chapter-14 (Text Book) Lecture 34-Lecture-35 Dr. Rahul Saha
Security in Wireless Personal Area Network (WPAN) : Chapter-14 (Text Book) Lecture 34-Lecture-35 Dr. Rahul Saha
The initial Bluetooth standard specified a transmission rate of 1 Mbps. At the low end, Task Group 4 in IEEE
802.15 supports low data rates, with low complexity and long battery life (lasting from months to years), of 20, 40, and
250 kbps. At the high end, Task Group 3 supports high data rates of 11 to 55 Mbps.
TG3A uses an alternative physical layer, including ultra wideband (UWB) radio, with data rates beyond 100 Mbps.
Bluetooth networks transmit on the 2.4-GHz band, which is an unlicensed frequency range. It uses 79 channels
between 2.402 and 2.480 GHz (in the United States and most of Europe).
In addition, microwave ovens operate on that frequency. While they generally are shielded properly, testing shows that
poorly shielded ovens can jam radios and reduce throughput by 75 percent (although an owner of such a leaky oven
probably has bigger problems to worry about than reduced throughput).
Bluetooth uses a fast-frequency-hopping algorithm, which switches frequencies at a rate of 1600 times per second.
Packets are short, typically around 350 bytes, and forward error correction (FEC) provides data integrity.
Bluetooth Network Terminologies
Piconet : 3 bit address, 1 master – 7 slaves
Master and Slave : 1 master always in the piconet, others are slaves, responsibility of FFHS, swapping of
parked node
Scatternet: collection of piconets, device (that is a master in one piconet and a slave in another)
Channel hopping provides additional protection, making it difficult to snoop on the data stream. The
fast rate of hopping makes it hard for a casual observer to “sniff ” the data stream off of one channel or
guess the hopping sequence.
Data are protected by the optional use of encryption. The encryption algorithm is, essentially, a stream
cipher that XORs the data stream with a stream of numbers from a pseudorandom-number
generator (PRNG) seeded by an encryption key. The keys are created and distributed by a key exchange
algorithm, so keys are not sent as plaintext.
Finally, nodes can perform authentication and authorization to verify the identity and access of both
parties that are communicating.
Bluetooth Security Modes and Levels
Three modes of security for devices: nonsecure,
service level enforced security, and link-level It defines two security levels for devices: trusted
enforced security. and untrusted.
Nonsecure: A device in the nonsecure mode does not Trusted devices allow unrestricted access to all
initiate any security procedure. This is intended for services, whereas untrusted devices do not.
public use devices, such as walkup printer.
Encryption keys protect the data in a session, whereas link-layer keys provide authentication and serve
as a parameter when deriving the encryption keys.
Finally, like any wireless device, care must be used when connecting it to an existing network because it might be
unintentionally exposing part of the internal network that had been protected behind a firewall
Bluetooth attacks
If two sites, A and B, communicate with each other using A’s unit key (KA) because of limited memory
on A, then afterwards site B can impersonate A as well as eavesdrop on A’s communications because B
knows that the key that will be used. Variations of a man-in-the-middle attack are possible. If an
attacker can synchronize with the frequency-hopping sequence, then it can eavesdrop.
https://www.youtube.com/watch?v=8vjIrCaFOfU
https://www.bluetooth.com/bluetooth-resources/building-a-sensor-driven-lighting-control-system-based-on-bluetooth-
mesh/
https://www.silabs.com/whitepapers/advantages-of-wireless-human-machine-interface-for-industrial-automation
https://global-carconnectivity.org/wpcontent/uploads/2020/04/CCC_Digital_Key_2.0.pdf
https://www.lairdconnect.com/resources/white-papers/bluetooth-deployment-hospital-settings
https://www.atmosic.com/2020-trends-for-battery-free-bluetooth-5-0-internet-of-things/
https://www.bluetooth.com/blog/wireless-connectivity-options-for-iot-applications-indoor-navigation/