+612 9045 4394
 
CHECKOUT
Bluetooth Security : Artech House Computer Security Series - Christian Gehrmann

Bluetooth Security

Artech House Computer Security Series

Hardcover Published: 5th July 2004
ISBN: 9781580535045
Number Of Pages: 222

Share This Book:

Hardcover

RRP $212.99
$150.50
29%
OFF
or 4 easy payments of $37.63 with Learn more
Ships in 15 business days

This resource examine the most significant attacks on Bluetooth security mechanisms and their implementations, demonstrating how some of these known weaknesses can be avoided with appropriate defensive measures. The book presents concrete examples of how to design security solutions for some Bluetooth applications and products built on these applications. Professionals find real-world case studies including technical algorithms, mechanisms and protocols, and security architecture. These architectures offer valuable guidelines for use in building Bluetooth and non-Bluetooth-specific security mechanisms.

Prefacep. xi
Bluetooth Security Basicsp. 1
Introductionp. 3
Bluetooth system basicsp. 3
Backgroundp. 3
Trade-offsp. 4
Bluetooth protocol stackp. 4
Physical layerp. 6
Basebandp. 7
Link manager protocolp. 13
Logical link control and adaptation protocolp. 15
Host control interfacep. 15
Profilesp. 17
Bluetooth security basicsp. 19
User scenariosp. 19
Notions and terminologyp. 22
Referencesp. 25
Overview of the Bluetooth Security Architecturep. 27
Key typesp. 27
Pairing and user interactionp. 29
Authenticationp. 30
Link privacyp. 31
Protect the linkp. 32
Encryption algorithmp. 32
Mode of operationp. 34
Unicast and broadcastp. 36
Communication security policiesp. 37
Security modesp. 38
Security policy managementp. 42
Referencesp. 42
Bluetooth Pairing and Key Managementp. 43
Pairing in Bluetoothp. 43
HCI protocolp. 44
LM protocolp. 45
Baseband eventsp. 46
Initialization key generationp. 47
Unit key generationp. 47
Combination key generationp. 49
Authenticationp. 50
Master key generationp. 52
User interactionp. 53
Cipher key generationp. 54
Encryption key K[subscript C]p. 54
Constraint key K'[subscript C]p. 55
Payload key K[subscript P]p. 57
Key databasesp. 58
Unit keys generation requirementsp. 58
Combination key generation requirementsp. 58
Key databasesp. 60
Semipermanent keys for temporary usep. 63
Referencesp. 63
Algorithmsp. 65
Crypto algorithm selectionp. 65
Block ciphersp. 65
Stream ciphersp. 66
SAFER+p. 67
Authentication algorithm E[subscript 1]p. 70
Unit key algorithm E[subscript 21]p. 71
Initial key algorithm E[subscript 22]p. 72
Encryption key algorithm E[subscript 3]p. 73
Encryption enginep. 73
Ciphering algorithm E[subscript 0]p. 74
Initializationp. 77
Implementation aspectsp. 79
Referencesp. 80
Broadcast Encryptionp. 81
Overviewp. 81
Preparing for broadcast encryptionp. 82
Switching to broadcast encryptionp. 83
Referencesp. 85
Security Policies and Access Controlp. 87
Objectivesp. 87
Trust relationsp. 88
Security levelsp. 88
Flexibilityp. 89
Implementation considerationsp. 89
Security manager architecturep. 90
Overviewp. 90
Device trust levelp. 91
Security level for servicesp. 92
Connection setupp. 92
Database contents and registration procedurep. 95
Referencep. 96
Attacks, Strengths, and Weaknessesp. 97
Eavesdroppingp. 97
Impersonationp. 105
Pairingp. 107
Improper key storagep. 109
Disclosure of keysp. 110
Tampering with keysp. 111
Denial of servicep. 111
Unit keyp. 112
Location trackingp. 113
Bluetooth device address and location trackingp. 113
Five different types of location tracking attacksp. 115
Implementation flawsp. 116
Referencesp. 117
Bluetooth Security Enhancementsp. 121
Providing Anonymityp. 123
Overview of the anonymity modep. 123
Address usagep. 124
The fixed device address, BD_ADDR_fixedp. 124
The active device address, BD_ADDRp. 125
Alias addresses, BD_ADDR_aliasp. 128
Modes of operationp. 128
Inquiry and pagingp. 129
Connectable modep. 129
Private connectable modep. 130
General connectable modep. 131
Alias authenticationp. 131
Pairingp. 133
Anonymity mode LMP commandsp. 133
Address update, LMP active addressp. 134
Alias address exchange, LMP alias addressp. 134
Fixed address exchange, LMP fixed addressp. 135
Pairing examplep. 136
Referencesp. 138
Key Management Extensionsp. 139
Improved pairingp. 140
Requirements on an improved pairing protocolp. 140
Improved pairing protocolp. 141
Implementation aspects and complexityp. 147
Higher layer key exchangep. 149
IEEE 802.1x port-based network access controlp. 150
Higher layer key exchange with EAP TLSp. 152
Autonomous trust delegationp. 154
Security group extension methodp. 154
Public key-based key managementp. 160
Group extension method versus public key methodp. 163
Referencesp. 164
Security for Bluetooth Applicationsp. 167
Headsetp. 168
Headset security modelp. 168
Pass-key and key managementp. 169
Examplep. 171
Network accessp. 173
Common access keysp. 174
Security architecturep. 175
Network service subscriptionp. 175
Initial connectionp. 177
Subsequent access to NAcPsp. 179
SIM accessp. 181
The SIM access profilep. 181
Securing SIM accessp. 182
Referencesp. 184
Glossaryp. 187
List of Acronyms and Abbreviationsp. 189
About the Authorsp. 195
Indexp. 197
Table of Contents provided by Rittenhouse. All Rights Reserved.

ISBN: 9781580535045
ISBN-10: 1580535046
Series: Artech House Computer Security Series
Audience: Professional
Format: Hardcover
Language: English
Number Of Pages: 222
Published: 5th July 2004
Publisher: Artech House Publishers
Country of Publication: US
Dimensions (cm): 22.9 x 15.2  x 1.3
Weight (kg): 0.45