Bluetooth: With Low Energy comes Low Security
|
|
|
- Valentine Roberts
- 9 years ago
- Views:
Transcription
1 Bluetooth: With Low Energy comes Low Security Mike Ryan isec Partners Abstract We discuss our tools and techniques to monitor and inject packets in Bluetooth Low Energy. Also known as BTLE or Bluetooth Smart, it is found in recent high-end smartphones, sports devices, sensors, and will soon appear in many medical devices. We show that we can effectively render useless the encryption of any Bluetooth Low Energy link. 1 Introduction Bluetooth Low Energy, also known as BTLE or Bluetooth Smart, is a new modulation mode and link layer packet format targeting low power embedded devices. It is typically found in recent high-end smartphones, sports devices, various sensors, and will soon appear in many medical devices. Given that the target devices for BTLE are expected to have low computation capabilities, compromises were made to simplify the protocol. Unfortunately, these decisions also undermine the privacy of the data transmitted over BTLE. After giving a brief overview of BTLE and the Ubertooth platform, we will demonstrate how to perform eavesdropping on a BTLE device. Following that we cover packet injection and breaking the encryption of Bluetooth Low Energy. Along with this whitepaper, we release open source tools to perform all the demonstrated attacks. Although commercial tools exist for following BTLE connections as they are established, they are designed to be used as a debugging aid and only print data values exchanged during this period. Our open source tools exceed these capabilities significantly. In addition to following new connections, we can also follow pre-existing connections by recovering connection parameters through novel techniques. We have also successfully demonstrated packet injection. We implement a BTLE monitor on the Ubertooth platform. Leveraging the power of the platform we are able to obtain the parameters required to recover encryption keys by using brute force search over a very small keyspace. 2 Bluetooth Low Energy Bluetooth is a short range connectivity protocol used in 9 billion devices. The number of devices integrating BTLE is expected to grow by 2.9 billion devices per year by 2016 [2]. Bluetooth Low Energy, defined in the Bluetooth Core Spec 4.0 [4], is a wireless protocol operating in the unlicensed 2.4 GHz band. While it operates in the same frequency range as other Bluetooth technologies, its operation at the PHY and link layers is incompatible. At the PHY layer BTLE uses Gaussian Frequency Shift Keying (GFSK) with a 250 khz offset. It transmits on one of 40 channels at 1 Mbit/sec. BTLE splits the 2.4 GHz spectrum into 40 channels spaced 2 MHz apart. 37 of the channels (data channels) are used during connections to transmit data and the remaining 3 (advertising channels) are used by unconnected masters and slaves to broadcast device information and establish connections. Every packet begins with an 8 bit preamble, an alternating binary sequence. This is followed by a 32 bit access address (AA) which can be thought of as a unique identifier which defines a particular connection. When a device (master or slave) transmits on an advertising channel it uses a fixed value of 0x8e89bed6 as the access address. The value used on data channels is communicated by the master to the slave during connection setup. Following the 32 bit access address is a variable length Protocol Data Unit (PDU) which contains the message payload. Finally all packets end with a 24 bit CRC. BTLE is aimed at lower-capability devices with limited power requirements such as embedded sensors. The timing parameters, specifically channel hopping rate, are
2 the seed of the LFSR depends only on the channel number. In practice whitening does not complicate sniffing as the seed and LFSR are known. Figure 1: Bluetooth Low Energy packet format less aggressive than other Bluetooth technologies. Other aspects of the protocol, such as whitening seed, are also simplified. These design simplifications ease the task of creating an eavesdropping tool. In addition, significant compromises were made in the key exchange protocol to account for the limited input and computing capabilities of low-power devices. While understandable in the context of the devices constraints, these compromises undermine the privacy of the system. 3 Eavesdropping We have implemented a sniffer capable of following BTLE connections as they hop across channels. Like commercial devices on the market [1], we are able to do so if we witness the initiation of a connection. Our major contribution is the ability to derive the parameters needed to follow a connection that has previously been established, for which we have not witnessed a connection setup. Several major technical hurdles prevent the simplistic eavesdropping common to First, as noted, BTLE devices hop across many channels in the 2.4 GHz spectrum, only staying on a particular channel long enough to transmit and receive a single packet. The time spent on each channel and the channel hop sequence varies from connection to connection. In addition, we rely on the 32 bit access address to determine when a packet has been transmitted, a value which also varies from connection to connection. Finally, in order to filter out false-positive packets we must verify the CRC on candidate packets, a calculation which depends on a 24 bit value known as CrcInit, which again is connection-specific. In summary, to sniff a connection we need to know four values unique to that connection: 1. Hop interval (also referred to as dwell time) 2. Hop increment 3. Access address 4. CRC init It is also worth noting that all data transmitted is whitened by XORing it with the output of a linearfeedback shift register (LFSR). Unlike classic Bluetooth 3.1 Ubertooth We built our sniffer on the Ubertooth platform. Ubertooth [6] is a USB dongle with an RF frontend, CC2400 radio chip, and LPC microcontroller. The CC2400 has a reconfigurable narrowband radio transceiver that can monitor a single BTLE channel at any given moment. The CC2400 (roughly) converts RF into a bitstream, which is then processed entirely on the LPC. The Ubertooth project also implements a partial sniffer for classic Bluetooth. Because BTLE is a simpler protocol than classic Bluetooth, we can process packets entirely on the LPC (on-dongle). In contrast the classic Bluetooth sniffer only uses the LPC to shovel bits from the CC2400 to the PC. Our approach allows us to operate with greater agility and enables the precise timing necessary for recovering hop interval and hop increment. Our approach also differs from the tactic used in [8] which uses a wide-band USRP to sniff several channels at the same time. We use a narrowband sniffer that is only able to tune to a single BTLE channel at any given moment. On one hand, our approach has much tighter timing requirements. On the other hand our hardware platform is much less expensive. 3.2 From RF to bytes When a BTLE device transmits a packet on a particular channel it generates a small amount of RF energy. At the lowest level this modulated RF is what we aim to sniff. Our first order of business is to therefore convert this RF into something we can work with: bits. We use the CC2400 radio chip on the Ubertooth to demodulate the signal. The CC2400 contains a reconfigurable modem whose demodulation parameters we configure to match those of BTLE. Namely, we configure the modem to demodulate GFSK with a frequency offset of 250 khz and a data rate of 1 Mbit. We configure the CC2400 to be in unbuffered mode and do all bitstream processing on the LPC. We do not configure the chip to look for a preamble, though that is a future optimization worth exploring. Instead it constantly spews bits to the LPC which we process in software. We identify the start of a transmission by searching for a known 32 bit access address. While we are on an advertising channel the AA is fixed as 0x8e89bed6. The AA used on a data channel is exchanged during connection setup which we obtain either by sniffing the connection setup or recover using techniques described later. 2
3 4 Promiscuous Mode We operate on the assumption that connections use all 37 data channels. The authors have never observed otherwise, but the specification does allow fewer to be used. In order to follow a connection, we need to know the hop interval, hop increment, access address, and CRC init as described in section 3. In connection following mode, these values are extracted from the connection initialization packet. In promiscuous mode, we recover them by exploiting properties of BTLE packets. 4.1 Determining Access Address Figure 2: Master and slave each transmit on every channel, even if they have no meaningful data to exchange The start of transmission, identified by access address, implicitly defines the byte boundary of the message. We therefore convert the bits into a sequence of bytes. From here on out, interpreting the bytes is a matter of referring to the spec. 3.3 Following Connections We are able to convert RF to bytes on a given channel. Bluetooth Low Energy connections do not remain on a fixed channel: they hop across a sequence of data channels following a predefined hopping pattern. In order to follow a BTLE connection we must therefore hop along the same channels as the master and slave. The BTLE channel hopping sequence is very straightforward. There are 37 data channels, and most connections use all 37. Given a hopincrement, defined on a perconnection basis, the next channel in a hopping sequence is calculated by: nextchannel channel + hopincrement (mod 37) While hopping, a master and slave hop to the same channel at the same time. The master transmits a packet, and the slave transmits a packet shortly thereafter. If they have no meaningful content to exchange, they will transmit an empty data packet which consists of a header, empty body, and 24 bit CRC. The master and slave will then wait for a period time called the hop interval before hopping to the next channel as defined above. Refer to figure 2 for a graphical explanation. In order to sniff these exchanges, our sniffer hops along the same sequence of channels at the same rate as the master and slave. Promiscuous mode begins by monitoring an arbitrary data channel looking for empty data packets. These have a predictable form and are transmitted frequently. The BTLE spec requires that a master and slave transmit a packet on each channel they hop to. Hops happen frequently (typically many times per second) and only small bursts of data are normally sent during a BTLE connection, so most of the packets transmitted are empty. Data packets consist of a 16 bit header, 0-37 octets of payload (PDU), and a 24 bit CRC. An empty data packet consists of a 16 bit header and 24 bit CRC. Two bits of the header vary (SN and NESN, used for flow control), while the rest remain a constant zero. These packets are thus easy to identify. We read the bitstream looking for the 16 bit header that defines an empty packet. When we identify the 16 bit pattern, we treat the prior 32 bits as a candidate access address (AA). As we are only filtering the candidate bitstream by 14 bits (when discounting for the 2 varying bits of header) we are left with many false positives. We keep a least-frequently used (LFU) table of every candidate AA we observe. After we observe a candidate AA a configurable number of times (we arbitrarily choose 5) we treat it as our target AA and can filter packets based on this value. 4.2 Recovering CRCInit Our techniques for recovering hop increment and hop interval are sensitive to timing and are ineffective in the presence of false positives. Therefore before moving onto that portion of our attack we must filter by CRC. Every packet carries a 24 bit CRC that is calculated over the bits of the packet (including the header). This value is calculated using a linear feedback shift register (LFSR) that is pre-seeded with a 24 bit value known as CRCInit. The CRCInit varies between connections, which presents a challenge: we are unable to verify CRCs until this 24 bit seed is recovered. 3
4 In [8] Spill and Bittau note that the LFSR used to calculate a classic Bluetooth CRC is reversible. This holds true for the BTLE CRC LFSR as well. When we receive a candidate packet, we seed the reverse LFSR with the CRC from the air. We then run the bits through the LFSR in the reverse order. The value left in the LFSR at the end of this exercise is our candidate CRCInit. As in the case of candidate access addresses, we maintain an LFU table of candidate CRCInit values and treat a value as our true CRCInit after it is observed a fixed number of times (again arbitrarily chosen to be 5 times). 4.3 Hop Interval The hop interval is recovered by observing that the hop sequence completes a full cycle once every hopinterval milliseconds. We sit on a data channel and measure the time between two consecutive packets. We directly calculate the hop interval using this formula: hopinterval = t ms If our sniffer misses a packet we may inadvertently calculate an integer multiple of the true hop interval. For this reason we measure the hop interval over several consecutive packets. After the same value has been observed a fixed number of times we treat that value as our hop interval. 4.4 Hop Increment Finally the hop increment is recovered by measuring the interarrival time of packets on two data channels (index 0 and 1). We wait for a packet on channel index 0, then jump to channel index 1 and measure the time it takes for a second packet to arrive. From the interarrival time, we can calculate the number of channels hopped between the first and second packet: channelshopped = t 1.25 ms hopinterval We wish to find hopincrement, which satisfies the following equation: 0 + hopincrement channelshopped 1 (mod 37) Rearranging terms, we are left with: hopincrement channelshopped 1 (mod 37) The channel hopping sequence is isomorphic to Z 37, a field. This means that the multiplicative inverse of channelshopped is well-defined (since channelshopped is non-zero). Fermat s little theorem gives the following closed form: channelshopped 1 channelshopped 37 2 (mod 37) We use a lookup table to map the 36 possible values to the hop increment. At this point, we have all four values needed to follow a connection, and we enter connection following mode as though we observed the initial connect packet. 5 Injection We have implemented BTLE packet injection as a proof of concept. From Ubertooth we send undirected advertising messages broadcasting the existence of a device with a user-specified MAC address. A PC running the Linux Bluetooth stack (bluez) receives these packets and lists the device during a scan for BTLE devices. The theory of operation is similar to receiving, but all the data flow occurs in the opposite direction. On the LPC we craft an undirected advertising packet, which has a well-defined form. The AdvA (advertising address) is set to the user-specified MAC address, and the packet CRC is calculated. Finally we whiten the data and send it to the CC2400 to be transmitted. We configure the CC2400 to operate in buffered mode due to quirks of the CC2400 s unbuffered mode. This does not affect the proof of concept, but a more sophisticated injector will likely require the tighter timing that can be achieved using unbuffered mode. This proof of concept paves the way for future attacks against the crypto system as well as Bluetooth stacks on devices. We discuss this further in the Future Work section. 6 Bypassing the Encryption BTLE features encryption and in-band key exchange. Rather than relying on a well-established key exchange protocol such as one based on Elliptic Curve Diffie- Hellmann (ECDH) [3], the Bluetooth SIG invented their own key exchange protocol. We demonstrate that this key exchange protocol has fundamental weaknesses that undermine the privacy of communication against passive eavesdroppers. We note that the session encryption provided by BTLE is known to be relatively secure. BTLE uses AES- CCM [9], against which there are no known practical attacks. Our attack targets the key exchange rather than the encryption itself. Our technique is similar in principle to [5] and [7] in which an offline brute force attack is 4
5 mounted to recover a secret value when all other values are transmitted over the air. Before establishing an encrypted session, a master and a slave must establish a shared secret known as a longterm key (LTK). Under typical operation, a master and slave establish an LTK once and reuse it for future sessions. Otherwise, the master and slave establish an LTK through a key exchange protocol. The key exchange protocol begins by selecting a temporary key (TK), a 128 bit AES key whose value depends on pairing mode. The master and slave use this value to calculate a so-called confirm value. Aside from the TK, all values used to calculate the confirm are exchanged in plaintext over the air. The confirm value itself is also exchanged over the air in plaintext. We exploit the fact that all values except the TK are publicly known in order to brute force the TK. As noted, the TK value depends on pairing mode. Three pairing modes are defined: Just Works TM, 6-digit PIN, and OOB. The TK is as follows: Just Works TM : 0 6-digit pin: a value between 0 and 999,999 padded to 128 bits. OOB: a 128 bit value exchanged out-of-band We use a simplistic brute force algorithm to guess TK: we calculate the confirm for every possible TK value between 0 and 999,999. If the master and slave used Just Works TM or 6-digit PIN, we will quickly find the proper TK whose confirm matches the value exchanged over the air. In practice we find that a TK can be cracked in less than one second on a single core of an Intel Core i7 CPU. This figure could be improved by brute forcing in parallel and/or using processor-specific AES extensions. After the confirm is calculated, the master and slave follow the rest of the key exchange protocol to establish a short-term key (STK) and finally an LTK. The STK exchange messages are encrypted using the TK, whose value we have trivially brute forced. Therefore, if we can crack the TK then we are able to decrypt the STK exchange and recover the STK. Finally the STK is used to establish a link-layer encrypted session over which the LTK is exchanged. If we crack the TK and recover the STK, we can decrypt this session and recover the LTK. From here on out if this master and slave communicate in the future they will use the LTK that was established using the mechanism described above. This optimization means that a passive eavesdropper who is able to recover the LTK is able to decrypt any future conversation between this master and slave, rendering the in-protocol encryption next to useless. Note that our technique is ineffective against a wellchosen OOB key. In practice we expect that Just Works TM and 6-digit PIN will be used in the overwhelming majority of use-cases. Exchanging a 128 bit OOB key is cumbersome and may require specialized hardware, whereas Just Works TM and 6-digit PIN are easy to implement even on the most constrained devices. To date, we have not found any devices that implement OOB key exchange. We also note that our attack can be performed offline. A passive eavesdropper can record the key exchange and encrypted session setup to a file. An offline tool can analyze the key exchange and crack the TK. Another tool can use this information to decrypt the encrypted session and dump the LTK exchange. Future conversations that use this LTK can be recorded and decrypted offline as long as the initial encryption setup (in which the session key is established) is recorded. We provide a tool called crackle to perform all these attacks. crackle is open source and available online. See section 10 for more information. 6.1 Mitigations and Counter-Mitigations Certain aspects of BTLE mitigate the attacks we describe above. As noted, if the master and slave have established an LTK they need not re-establish a key using the key exchange protocol. In addition, each encrypted session uses a session-specific nonce exchanged at the beginning of the session. Therefore even if the LTK is known, if the session initialization is not captured the conversation cannot be decrypted. We present one theoretical and one practical active attack against those mitigations. To counter the first issue, we note that the BTLE protocol has provisions for a master or slave to reject a LTK. This may be used, for instance, if the slave device loses its memory. We theorize an attack in which an eavesdropper waits for an encrypted session to be initiated. At the proper moment during initialization, the eavesdropper forces a key renegotiation by injecting the appropriate link layer message (LL_REJECT_IND). We can then attack the initialization using the technique described above as if it were a new connection. Countering the second issue, the case in which we know the LTK but do not know the session nonce, is trivial. We jam the connection, which forces the master and slave to reconnect and re-establish a secure session, allowing us to sniff the nonce. Our jammer follows along the channel hopping sequence and injects random noise (output from an LFSR). In practice this kills connections almost instantly. 5
6 7 Future Work Our contributions demonstrate several passive attacks against the BTLE protocol. We also demonstrate a proof of concept injector on the Ubertooth platform which lays the foundation for a multitude of interesting attacks described below. In section 6 we describe a theoretical attack to force a key renegotiation. If this attack succeeds it will prevent a master and slave from using a pre-established key to secure their communication. At this point if a master and slave wish to use encryption they must renegotiate a key, a process which we have demonstrated is vulnerable to a passive attack. Expanding on this attack, we theorize that it is possible to perform a full man-in-the-middle (MitM) attack between the master and slave. To simplify this thought experiment, suppose we have two Ubertooth dongles connected to the same PC. On one dongle, the faux slave, we implement a slave stack that communicates with the true master. On the second dongle, the faux master, we implement a master stack that communicates with the true slave. The data would then be marshalled through the PC where it can be tampered with without detection by the target devices. Such an attack may even be effective in the presence of encryption. We allow the true master and slave to communicate directly to establish an LTK. If the master and slave use Just Works TM or 6-digit pin pairing, we can recover the LTK using the process described in section 6. We then jam the connection with one of the dongles and interpose with the faux master and slave. Since we know the LTK, we can establish independent encrypted streams between the faux and true devices that are encrypted and authenticated from the perspective of the true devices. Fully functioning BTLE master and slave stacks also invite the possibility of a stack fuzzer. The BTLE stacks on smartphones, PCs, and slave devices all present large unexplored attack surfaces. There is great potential for memory corruption due to multiple layers of the packet (link layer and L2CAP) having variable length fields. Additionally, we expect much of the stack to be implemented in kernel space. 8 Conclusion We presented techniques for eavesdropping on Bluetooth Low Energy conversations. We show how packets can be intercepted and reassembled into connection streams. We also demonstrate an attack against the key exchange protocol which renders the encryption useless against passive eavesdroppers. This eliminates any confidentially associated with the protocol. We also provide the first BTLE sniffer that is able to follow connections that have already been established at the time of sniffing. Finally we provide a proof of concept injector. This paves the way for many future active attacks against hosts and devices. We offer theoretical attacks for key renegotiation, man-in-the-middle, and hypothesize a BTLE stack fuzzer. 9 Acknowledgments We thank Michael Ossmann for designing the Ubertooth hardware and for generously donating an Ubertooth dongle. We also thank Dominic Spill of the Ubertooth project. This work would not be possible without their knowledge, guidance, and humo[u]r. We also thank Mike Kershaw (dragorn), marshallh, Zero_Chaos, Jared Boone, and the rest of the Ubertooth team for technical and moral support. Many thanks to isec Partners for funding a portion of this research. Finally the author thanks his wife Jia Guo for tolerating many late nights of hacking. 10 Availability Bluetooth Low Energy sniffing and injection is available as a part of the Ubertooth project. The project, including the Ubertooth hardware design, is open source. For source, documentation, and more information please visit: Wireshark plugins for dissecting Bluetooth Low Energy packets are available as a part of the open source libbtbb project: crackle, the BTLE encryption cracker, is available open source at: References [1] CC2540 USB Evaluation Module Kit. tool/cc2540emk-usb. [2] SIG Membership. SIG-Membership.aspx, [Online; accessed 01-May-2013]. [3] BARKER, E., JOHNSON, D., AND SMID, M. NIST SP A, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, Mar [4] BLUETOOTH SIG. Bluetooth Specification Version 4.0. Bluetooth SIG,
7 [5] LINDELL, A. Y. Attacks on the pairing protocol of bluetooth v2.1. In BlackHat Briefings (Las Vegas, NV, USA, June 2008). [6] OSSMANN, M., AND SPILL, D. Building an All-Channel Bluetooth Monitor. In ShmooCon 5 (Washington, DC, USA, 2009). [7] SHAKED, Y., AND WOOL, A. Cracking the bluetooth pin. In Proc. 3rd USENIX/ACM Conf. Mobile Systems, Applications, and Services (MobiSys) (2005), pp [8] SPILL, D., AND BITTAU, A. Bluesniff: Eve meets alice and bluetooth. In Proceedings of the first USENIX Workshop on Offensive Technologies (Boston, MA, USA, 2007), WOOT 07, USENIX Association, pp. 5:1 5:10. [9] WHITING, D., HOUSLEY, R., AND FERGUSON, N. Counter with CBC-MAC (CCM). RFC 3610 (Informational), Sept
Bluetooth Smart, But Not Smart Enough
Mike Ryan isec Partners isec Open Forum Jan 31, 2012 Slides and More Info http://lacklustre.net/bluetooth/ Overview Three parts what is LE how do we sniff it demo! security analysis 3 What is Bluetooth
Bluetooth Packet Sniffing Using Project Ubertooth. Dominic Spill [email protected]
Bluetooth Packet Sniffing Using Project Ubertooth Dominic Spill [email protected] Dominic Spill Bluesniff: Eve meets Alice and Bluetooth Usenix WOOT 07 Building a Bluetooth monitor Shmoo/Defcon/Toorcamp
PM0237 Programming manual
Programming manual BlueNRG, BlueNRG-MS stacks programming guidelines Introduction Note: The main purpose of this document is to provide a developer with some reference programming guidelines about how
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Bluetooth Jamming. Bachelor s Thesis. Steven Köppel. [email protected]
Distributed Computing Bluetooth Jamming Bachelor s Thesis Steven Köppel [email protected] Distributed Computing Group Computer Engineering and Networks Laboratory ETH Zürich Supervisors: Michael
Logitech Advanced 2.4 GHz Technology With Unifying Technology
Logitech Advanced 2.4 GHz Technology Revision 070709 July 7, 2009 TABLE OF CONTENTS 1 INTRODUCTION: THE MOVE TO WIRELESS PERIPHERALS IN BUSINESS...3 2 SYSTEM OVERVIEW...4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
Authentication and Security in Mobile Phones
Authentication and Security in Mobile Phones Greg Rose QUALCOMM Australia [email protected] ABSTRACT Mobile telephone systems have a checkered reputation regarding security and authentication features after
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Kryptoanalyse og anngrep på Bluetooth
Kryptoanalyse og anngrep på Bluetooth Marius Amund Haugen Master i kommunikasjonsteknologi Innlevert: Desember 2012 Hovedveileder: Stig Frode Mjølsnes, ITEM Norges teknisk-naturvitenskapelige universitet
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Logitech Advanced 2.4 GHz Technology
Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION...
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ
LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
WIRELESS INSTRUMENTATION TECHNOLOGY
BS&B WIRELESS, L.L.C. BS&B WIRELESS, L.L.C. WIRELESS INSTRUMENTATION TECHNOLOGY Printed February 2004 BS&B WIRELESS, L.L.C. 7422-B East 46th Place, Tulsa, OK74145 Phone: 918-622-5950 Fax: 918-665-3904
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Presenter: Wenyuan Xu Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh Wenyuan
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
Evaluating GSM A5/1 security on hopping channels
Evaluating GSM A5/1 security on hopping channels Bogdan Diaconescu v1.0 This paper is a practical approach on evaluating A5/1 stream cipher on a GSM hopping network air interface called Um. The end goal
UG103.14: Application Development Fundamentals: Bluetooth Smart Technology
UG103.14: Application Development Fundamentals: Bluetooth Smart Technology This volume of Silicon Labs Application Development Fundamentals series provides an overview of Bluetooth Smart, also known as
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
For Your Eyes Only: Protecting Data-in-Motion with Dispersive Virtualized Networks
For Your Eyes Only: Protecting Data-in-Motion with Dispersive Virtualized Networks Dispersive Technologies software and cloud-based virtualized networks deliver mission-critical communications over the
Waspmote Encryption Libraries. Programming guide
Waspmote Encryption Libraries Programming guide Index Document version: v4.3-01/2015 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General Concepts... 4 2. Integrity... 7 2.1. Waspmote Libraries...7
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
Revision of Lecture Eighteen
Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses
What s on the Wire? Physical Layer Tapping with Project Daisho
What s on the Wire? Physical Layer Tapping with Project Daisho Dominic Spill, Michael Kershaw, Michael Ossmann Black Hat USA 2013 Abstract Daisho is a project to produce an extensible, open source monitor
Maximizing Range and Battery Life in Low-Cost Wireless Networks
Maximizing Range and Battery Life in Low-Cost Wireless Networks The proliferation of cost-effective wireless technology has led to the rise of entirely new types of networks across a wide range of applications
Attacks on the Pairing Protocol of Bluetooth v2.1
Attacks on the Pairing Protocol of Bluetooth v2.1 Andrew Y. Lindell June 25, 2008 Abstract The Bluetooth protocol for close-range wireless communication has been a huge success. It is a widely adopted
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2003): 15 Wireless LAN Security 1. Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security (WS 2003: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control (MAC and physical characteristics
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastr, David Wagner Presented By: Tristan Brown Outline Motivation Cryptography Overview TinySec Design Implementation
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz
AN1200.04 Application Note: FCC Regulations for ISM Band Devices: Copyright Semtech 2006 1 of 15 www.semtech.com 1 Table of Contents 1 Table of Contents...2 1.1 Index of Figures...2 1.2 Index of Tables...2
TDM & FDM Overlays on Bluetooth
TDM & FDM Overlays on Bluetooth Abdelshakour Abuzneid, Sarosh Patel Viqar U.Mohammed, Varun Kumar Godula Department of Computer Science & Engineering University of Bridgeport {abuzneid, saroshp,vmohamme,vgodula}@bridgeport.edu
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
IronKey Data Encryption Methods
IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication
Network Security. Modes of Operation. Steven M. Bellovin February 3, 2009 1
Modes of Operation Steven M. Bellovin February 3, 2009 1 Using Cryptography As we ve already seen, using cryptography properly is not easy Many pitfalls! Errors in use can lead to very easy attacks You
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
One Time Pad Encryption The unbreakable encryption method
One Time Pad Encryption The unbreakable encryption method One Time Pad The unbreakable encryption method One Time Pad encryption is a very simple, yet completely unbreakable cipher method. It has been
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2
Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK
Current and Future Trends in Medical Electronics
Current and Future Trends in Medical Electronics By Steven Dean, Medical Marketing Director, Texas Instruments www.arrownac.com 800.833.3557 Current and Future Trends in Medical Electronics By Steven Dean,
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
Tecnologías Inalámbricas.
Tecnologías Inalámbricas. Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
CS 336/536 Computer Network Security. Summer Term 2010. Wi-Fi Protected Access (WPA) compiled by Anthony Barnard
CS 336/536 Computer Network Security Summer Term 2010 Wi-Fi Protected Access (WPA) compiled by Anthony Barnard 2 Wi-Fi Protected Access (WPA) These notes, intended to follow the previous handout IEEE802.11
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
Elliptic Curve Cryptography
Elliptic Curve Cryptography Elaine Brow, December 2010 Math 189A: Algebraic Geometry 1. Introduction to Public Key Cryptography To understand the motivation for elliptic curve cryptography, we must first
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
Implementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP
SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP WHO ARE WE? Tobias Zillner Senior IS Auditor @Cognosec in Vienna Penetration Testing, Security Audits, Security Consulting Breaking stuff
Privacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
BLUETOOTH SMART CABLE REPLACEMENT
BLUETOOTH SMART CABLE REPLACEMENT APPLICATION NOTE Monday, 15 October 2012 Version 1.5 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes no responsibility for
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2) Disha Baba Banda Singh Bahadur Engineering College Fatehgarh Sahib, Punjab Sukhwinder Sharma Baba Banda Singh Bahadur Engineering College Fatehgarh
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
