Analysis of Bluetooth Security Threats and Mitigation

Verified

Added on  2025/05/03

|7
|1826
|329
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
MITS5003
Student ID:
Student Name:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abstract:
Bluetooth is a wireless technology that is
used in various ways for the exchange of
data. It does not need any kind of
permission for the data transfer and does
need any license so it is free of cost. It is
the most common use of technology for a
shorter distance of transmission. It has
some limitations like privacy and security
issue which should be improved in the
later versions of Bluetooth. Bluetooth
makers doing their best to improve this
technology, which is discussed in the
paper.
Introduction
Bluetooth is a wireless technology that
works in a small defined area. First
discovered in 1994 and after it gains a lot
of popularity for transferring of data at free
of cost. As doesn’t need any authority to
regulate as it does not have any license. It
is automatically configuring to send the
data like images, videos, audio. There are
many versions of Bluetooth like 4.0,4.1
and 5.0 versions. it is first discovered by
Ericsson mobile, Sweden. And it is launch
in 1999 for first public use. It operates at a
short wavelength of 2.4GHz to 2.48GHz.
Ease of use
Bluetooth technology is used in various
platforms like mobile, laptop, televisions
and many devices. It is used in mainly in
data transfer at free of cost and it does not
need any license to operate Since this
technology does not charge any amount for
transferring of data, its popularity
increases in the recent times. Bluetooth
technology gains a lot of recent; its
improved versions have good data
transfers speed with a good range.
In the first paper, security threats are
discussed –
Bluetooth technology has some problems
which lead to a security issue and privacy
information. There are many threats
discussed in the paper. How Bluetooth is
attacked by malware.
In the second paper, there is a discussion
on enhanced security with simple pairing.
Many types of pairing are discussed here
for enhanced security of Bluetooth
The main issue is discussed here to reduce
the attack of malware in the data transfer
Description:
Security threats are discussed herein as
data transfer via Bluetooth. As Bluetooth
has some loopholes it can easily be altered
by any other malware and the network
working is changed. As every Bluetooth
device as a unique number that can be
monitored by using that number. There is
some malware like Man-in-The-Middle [1]
Document Page
(MITM), PIN break Attack. The effect
range of Bluetooth enabled devices are ten
to a thousand meters, depending upon the
Bluetooth configuration. It operates at a
frequency of 2.4GHZ to 2.46GHz. It
operates over 1600 times per second which
helps in less interference in transmission
and fewer security threats. Many types of
Bluetooth devices are made [1].
1) Classical Bluetooth devices
2) Smart Bluetooth devices also named
as Bluetooth low energy.
As these two types of have different
topographies so it is not able to
communicate with each other. A dual
Bluetooth device is used to overcome this
problem. This helps in data transfer with
both the devices.
Bluetooth Architecture
It mainly consists of
Bluetooth controller
Host controller interface
Bluetooth host
Bluetooth controller is the main part of
Bluetooth technology. It is made up of
three layers
1) Link manager layer: it is for the
connection built up. It sets up or breaks the
connection of signal.
2) Baseband Layer: it is responsible for
the connecting of interconnections.
3) Radio layer: its role is to transmit and
receive the information at radio frequency.
Host Controller interface:
It acts as a layer between the Bluetooth
modem and Bluetooth host for the
exchange of data
Security Threats:
Anything which results in the degradation
of the system is called a threat.
They are of two types:
1) Attack: it is defined as to enter the
premises with any prior permission for any
suspicious activity like data breaching,
data stolen. Attackers can change the
working of the system
2) Malware: it is a kind of virus that is
specially assigned to degrade any program.
It was first known in 1990.
Example: - worms, Trojan.
Bluetooth attacks
There are many types by which Bluetooth
can be attacked. These attacks can damage
the data which results in the less security
and privacy of Bluetooth. Depending upon
the type of degree of attack it is broadly
classified into high severity, low and
medium [1].
Document Page
Some types of attacks are
PIN theft attack: In this type, a pin is
stolen and used by intruders for doing any
harmful activity.
PIN Break Attack: a one to eight bytes
long pin is broken by using some various
techniques.
Man, in the middle attack: - in this
method a virtual access point is created
which alters the data that is being
transmitted, to done this both devices
should use the same hopping speed. In this
no one able to know that any third person
is connected with the devices which are
altering their data. In this type the intruder
only alters or access the transmission
information it will not able to enter in the
device information.
Relay Attack: also known as a
reflection attack, two-person who are
communicating are joined with the same
devices, both the person wasn’t able to
know that some other devices are also
connected.
Mac Address spoofing attack: it
consists of forty-eight bits in which the
first twenty-four bits are assigned to those
entities which are creating the devices and
the rest twenty-four bits are used by the
creator to assign every unique number to
devices for further track. In this attack, a
virtual mac address is created for taking
the others data with knowing them.
In Paper second protected and very simple
pairing is discussed with less security
threat.[2] In this, the latest version of
Bluetooth i.e. 5.0 is made which is secure
and results in secure paring. A P-256 is
made with a curved path which supports
all the version of Bluetooth. in this paper
some new security features are discussed.
As the link generates while pairing the
code is not properly encoded and can be
read by any third person for any data
breaching or misuse. In this paper, its
drawbacks are discussed. The simple
secure pairing uses the Hellman key
algorithm. This algorithm is mainly used
by Bluetooth version 5 which is the latest
version, but somehow the MITM is cannot
be purely overcome with this but can be
become less at some extent.
To develop the SSP some following
hardware and software are used.
Hardware details:
Ubuntu 14.04 in thirty-two bit as Intel
Core 2 Duo with a ram of two GB and
cache size of 2048KB
Software requirements of ucbt-0.9.9.20. it
uses. sage extension file
Working of SSP
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
As to simpler the process SIG is
introduced with a version of 2.1 higher it
uses some input-output devices like a
keyboard or numeric pad which takes the
input and display the 6-number pairing key
by using the near field communication and
provides better stability for the connection
Performance of SSP
Runtime complexity: - 3.11760874 sec
is the runtime for the SSP for the 256 bits.
It takes 80% of pairing time. It’s also
defined as the exchange of keys of both the
person in a time.[2]
The net time taken can be measured by
taking the total computation +
communicating time.
Strength outcome: the strength of the
signal is based on the type of
authentication, coding, decoding, and
some malware attack.
Comparison Result
In the first paper, various types of attack
are discussed and various types of hacking
are discussed. The security threats are
discussed and how the data breach or taken
with knowing by the victims[1]. The thief
can able to make device transfer data full
control. Some safety measure is discussed,
it also gives a brief introduction about the
Bluetooth, its discovery and its evolution
and it has made its place in the technology
by its some unique features [2]. Different
types of security threats are discussed and
how it works are discussed some safety
measure are also discussed here
In the second paper, some advance
Bluetooth versions are discussed and how
to overcome the threat of stealing the data
and to protect the data from any third
person. Moreover, it introduced simple
secure pairing which helps the user to pair
its Bluetooth devices by entering the PIN
or any sort of password which quickly
pairs the two Bluetooth devices and results
in the secure transfer of information. This
SSP plays a vital role in protecting the
data. Some dual Bluetooth devices are also
discussed here for the operating with two
different generations of Bluetooth for the
smooth transmission of data with any
difficulty. Some safety measure is also
discussed here to protect the data from
taken away by some third person [2]
Comments
Safety measure should be taken for the
proper transmission of data without being
altered
SSP is used in all Bluetooth devices for
the safety
It’s a portable technology which can be
used anywhere
Document Page
The limitation of Bluetooth is data
transfer is not safe.
Some Solutions for the prevention of data
is stolen.
Don’t turn on the Bluetooth every time,
turn it on when needed
Don’t turn on the visibility of
Bluetooth unless needed
Install some firewall for protection data
from any virus
Always change the name of the device
after purchasing
Don’t share the pairing pin with anyone
Use unique pin don’t use a name,
phone number as a pin, always use
different characters for the pin
Don’t pair with unknown source
Always have a look at the information
usage.
Conclusion
With the study of the two papers, it is clear
that the Bluetooth is a very good
technology and it has various types of uses
in the wireless technology and it does not
need any kind of license so it is doesn’t
charge any cost for the usage of
technology. It is good for short distance
communication with a good data transfer
speed, it has some limitations like
information is not safe while transferring
the data, it can be taken or alter by any
third person. Various kinds of security
measures are discussed and should be
taken into account for safety purposes. The
SSP plays a vital role in protecting the
security of the data transfer by Bluetooth
and also has fast transmission. Many kinds
of preventative measure are also discussed
to like change of pin, change of device
name, don’t pair with the third person,
don’t disclose the pin without anyone.
These are some safety measure of using
Bluetooth.
References:
[1]
Document Page
Gajbhiye, S., Karmakar, S., Sharma, M. & Sharma, S., 2019. Bluetooth Secure Simple
Pairing with enhanced security level.. Journal of Information Security and Applications,,
44(1), p. 170–183..
[2] Hassan, S. S., Bibon, S. D., Hossain, M. S. & Atiquzzaman, M., 2018. Security threats in
Bluetooth technology.. Computers and Security,, 74(1), p. 308–322.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]