Skip to main content

How to Secure Bluetooth-Based Pico Networks

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2007)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4680))

Included in the following conference series:

  • 2078 Accesses

Abstract

We have examined Bluetooth-based Pico-network (Piconet) applications in wireless computing and cellular devices and found an extensive number of “unexpected abuses”, where the security expectations of the device owner can be violated. We have studied the underlying causes of such problems and found that many products lack the controls to administer these devices securely. We also observed cases where explicit security claims from the Bluetooth protocol are not satisfied. We classify a number of abuses and security violations as Bluetooth protocol design flaws, application-layer implementation errors or simply pitfalls in the security management. Using this classification we define a core set of requirements that would improve security significantly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Nilsson, D.K., Porras, P.A., Jonsson, E.: Analyzing and Securing Bluetooth-based Pico Networks. Technical report, Chalmers University of Technology (2007)

    Google Scholar 

  2. BSI. Bluetooth, Threats and Security Measures. Technical report, BSI (2003)

    Google Scholar 

  3. Gehrmann, C., Nyberg, K.: Enhancements to Bluetooth Baseband Security. In: 6th Nordic Workshop on Secure IT-systems (NordSec) (2001)

    Google Scholar 

  4. Janssens, S.: Preliminary Study: Bluetooth Security. Technical report, Vrije Universiteit Brussel (2005)

    Google Scholar 

  5. Levi, A., Cetintas, E., Aydos, M., et al.: Relay Attacks on Bluetooth Authentication and Solutions. In: Aykanat, C., Dayar, T., Körpeoğlu, İ. (eds.) ISCIS 2004. LNCS, vol. 3280, Springer, Heidelberg (2004)

    Google Scholar 

  6. Ritvanen, K., Nyberg, K.: Upgrade of Bluetooth Encryption and Key Replay Attack. Technical report, Helsinki University of Technology (2004)

    Google Scholar 

  7. Rousseau, L., Arnoux, C., Cardonnel, C.: A Trusted Device to Secure a Bluetooth Piconet. In: Gemplus Developer Conference (2001)

    Google Scholar 

  8. Su, J., Chan, K.K.W., Miklas, A.G., et al.: A preliminary investigation of worm infections in a bluetooth environment. In: 4th ACM workshop on Recurring malcode, ACM Press, New York (2006)

    Google Scholar 

  9. Bluetooth SIG.: Bluetooth Specification Version 2.0 + EDR (2004)

    Google Scholar 

  10. Muller, T.: Bluetooth Security Architecture (1999)

    Google Scholar 

  11. Gehrmann, C., Persson, J., Smeets, B.: Bluetooth Security. Artech House, Inc. (2004)

    Google Scholar 

  12. Howard, J.D., Longstaff, T.A.: A Common Language for Computer Security Incidents (1998)

    Google Scholar 

  13. Whitehouse, O.: Bluetooth. In: CanSecWest (2004)

    Google Scholar 

  14. Frontline.: FTS4BT Bluetooth Protocol Analyzer & Packet Sniffer (2005)

    Google Scholar 

  15. Jakobsson, M., Wetzel, S.: Security Weaknesses in Bluetooth. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 176–191. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  16. Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. In: 3rd USENIX/ACM Conf. Mobile Systems, Applications, and Services (MobiSys), ACM Press, New York (2005)

    Google Scholar 

  17. Motorola: HS820 Wireless Headset with Bluetooth Technology (2005)

    Google Scholar 

  18. Bluetooth SIG. Bluetooth Security White Paper (2002)

    Google Scholar 

  19. Bluejackq: Bluejacking (August 2005), bluejackq.com

  20. Laurie, A., Holtmann, M., Herfurt, M.: Hacking Bluetooth enabled mobile phones and beyond - Full Disclosure. In: Blackhat Security Briefings (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Francesca Saglietti Norbert Oster

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nilsson, D.K., Porras, P.A., Jonsson, E. (2007). How to Secure Bluetooth-Based Pico Networks. In: Saglietti, F., Oster, N. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2007. Lecture Notes in Computer Science, vol 4680. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75101-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75101-4_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75100-7

  • Online ISBN: 978-3-540-75101-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics