Bluetooth technology security

Publisher:游走人间Latest update time:2011-04-21 Reading articles on mobile phones Scan QR code
Read articles on your mobile phone anytime, anywhere

1 Introduction
Bluetooth technology is based on chips and provides short-range wireless frequency hopping communication. It has low power requirements and can be embedded in any digital device. Digital devices with Bluetooth chips, such as portable computers, mobile phones, and PDAs, can communicate through the Bluetooth mobile network. In a few years, Bluetooth will appear in devices such as TVs, Hi-Fis, VCRs, and microwave ovens.
The wireless frequency hopping technology used by Bluetooth has led people to mistakenly believe that the security mechanism of Bluetooth has been solved. But in fact, wireless frequency hopping technology is not a technical obstacle for eavesdroppers and interceptors. Current Bluetooth chips and devices do not have security measures such as data confidentiality, data integrity, and user identity authentication.
Like other wireless communication networks, the Bluetooth network is also an open network. When the Internet was first designed, it did not consider the design of security mechanisms, and it still faces many security issues today. The first generation of mobile communications also did not design security mechanisms, resulting in the first generation of mobile communication devices being imitated and monitored. Although the second generation mobile communication GSM network uses encryption algorithms to identify users, the encryption algorithms are relatively weak and are very easy to be deciphered. Deciphering software can be downloaded on the Internet. There is no effective encryption measure for voice signals, not only on mobile phones, but also between stations.
At present, the Internet, third generation mobile communications and WAP all use PKI technology and a combination of public key algorithms and symmetric key algorithms to ensure identifiability, data integrity and confidentiality, and non-negligibility of communication.
Now, while SIG is discussing Bluetooth protocol version 2.0, the industry has implemented Bluetooth protocol version 1.0 and 1.0B. At present, the protocol stack based on version 1.0B has entered the use stage, and various Bluetooth devices have been launched or are under development.
At the beginning of the birth of Bluetooth technology, its security issues were not considered. Although a 128-bit chip number is now provided as the device authentication number, it can be tampered with and used fraudulently during communication.
SIG has recently begun to pay attention to the security issues of Bluetooth and has initially proposed Bluetooth security modes 1, 2 and 3. Since the detailed security scheme of mode 3 is still under discussion, this article mainly discusses the security of Bluetooth based on mode 2. 2 Bluetooth security structure Bluetooth technology has become the focus of global telecommunications and electronic technology development. Newly developed products using Bluetooth technology are also emerging in an endless stream. Bluetooth technology is being widely used in computer networks, mobile phones, PDAs and other fields. Bluetooth chips are the basis of Bluetooth devices. Western countries have produced Bluetooth chips based on different technologies (CMOS, silicon on insulator, etc.). The price of Bluetooth chips has been declining and will reach a generally acceptable level in the next two years. A mobile network terminal based on Bluetooth technology can be composed of four parts: Bluetooth chip and embedded hardware devices, Bluetooth core protocol stack, Bluetooth support protocol stack and application layer protocol. A secure mobile network terminal based on Bluetooth technology also includes a security management system. The system structure of a secure mobile network terminal based on Bluetooth technology is shown in Figure 1.



Some Western companies develop LMP (Link Management Protocol) on chips, while others solidify LMP in chips. 3 Protocol stack and security management system International standards specify three security modes for Bluetooth devices: Mode 1, most existing Bluetooth-based devices do not use information security management and do not perform security protection and processing; Mode 2, Bluetooth devices use information security management and perform security protection and processing, and this security mechanism is established in L2CAP and the protocols above it; Mode 3, Bluetooth devices use information security management and perform security protection and processing, and this security mechanism is established in chips and LMP (Link Management Protocol). Given the current status of Bluetooth chips, adopting Mode 3 will require redesigning existing Bluetooth chips and adding and enhancing chip functions, which is not conducive to reducing chip prices. Western Bluetooth technology manufacturers are considering adopting Mode 2. The security mechanism of Mode 2 allows security to be enhanced on different protocols. L2CAP can enhance Bluetooth security, RFCOMMM can enhance the security of Bluetooth device dial-up Internet access, and OBEX can enhance the security of transmission and synchronization. Bluetooth's security mechanism supports authentication and encryption. Authentication and verification can be bidirectional, and the key establishment is achieved through a bidirectional link. Authentication and encryption can be implemented in the physical link (for example, at the baseband level) or through the upper layer protocol. 4 Security Technical Implementation (1) DH Scheme The DH algorithm is used to establish the key used by both parties to encrypt information. The workflow is as follows. In the first communication, when the communication state has been established, the sender transmits A to the receiver through a wireless frequency hopping signal. A = g^x mod p After receiving A, the receiver sends B to the sender. B = g^y mod p Then, the sender and the receiver perform the following calculation: key = g^xy mod p Since both parties have key, when the two parties communicate further, they can encrypt the sent file or data M. C = key(M) The receiver can use the same key to obtain the plaintext. M = key (C) The DH scheme has its disadvantages, namely, it does not authenticate the user. (2) RSA scheme The RSA scheme can effectively solve the user's identity authentication and key establishment. Its workflow is as follows. A and B are users of Bluetooth wireless communication. A and B obtain their own electronic certificates from the same CA (electronic certificate authority), which include their own public keys and validity. They also have CA's certificate. When A and B communicate: the first step is that A sends its certificate to B, and B verifies A's certificate. The second step is that after confirming A's certificate, B sends its own certificate to A. The third step is that after A confirms B's certificate, it encrypts it with B's public key. A symmetric key used for data encryption is calculated as follows: C = (key) PBmodN , where N = p. q, p and q are two large prime numbers, N is the modulus, and PB is the public key. Step 4: After B receives C, it performs the following operation: key = CR B mod NR B is B's key. Step 5: After step 4, both parties have key, and the communication between the two parties can be encrypted with key, C = (M) key. Since only A and B know key, only A and B can decrypt the encrypted C. This protocol stack and security management system can be built on any Bluetooth device based on RFCOMMM. Its goal is to establish a secure Bluetooth communication mechanism. In the process of identification and authentication, some previous Bluetooth devices can realize device identification. This example can realize user identity authentication, and it has the following other advantages. 1) It can not only authenticate the device, but also the user's identity to prevent impersonation and counterfeiting of devices. In L2CAP or RFCOMMM, call the function MDH (element, root, modenln, VAR1, VAR2, VAR) to establish a shared key between the two parties and implement user authentication. 2) Reliable and secure encryption, flexible encryption method. The encryption function can be implemented by EXBX, RFCOMMM or L2CAP calling the EA (Data, Key, VAR1) of the security management system, and decryption is implemented by CA (Data, Key, VAR1). 3) Data integrity. The system can detect interference and changes in transmission signals. In any level of protocol, by calling MAC (Data, Key, VAR1, VAR2), the interference and changes to the wireless signal can be found. 5 Conclusion Bluetooth technology is attracting more and more attention, and its applications in industry and home are also increasing. Its security will be valued by users as it is applied, and designing and planning Bluetooth security has become an urgent task. The purpose of this article is to start a discussion and reference by industry experts to develop Bluetooth technology to be more perfect and practical.
































Reference address:Bluetooth technology security

Previous article:Bluetooth technology issues, prospects and China's spectrum management strategy
Next article:Bluetooth Technology and Its Current Development

Latest Analog Electronics Articles
Change More Related Popular Components

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号