Bluetooth Packet Sniffing Using Project Ubertooth. Dominic Spill
|
|
|
- Charleen Davidson
- 9 years ago
- Views:
Transcription
1 Bluetooth Packet Sniffing Using Project Ubertooth Dominic Spill
2 Dominic Spill Bluesniff: Eve meets Alice and Bluetooth Usenix WOOT 07 Building a Bluetooth monitor Shmoo/Defcon/Toorcamp 09 With Michael Ossmann Lead on project Ubertooth
3 Disclosure Not an employee of GSG I receive some funding Not here to sell Ubertooths
4 Warning If you wish to remain anonymous: Remove your name from Bluetooth device names Or turn off Bluetooth devices now Live demos at a con may not work Especially when using 2.4GHz
5 Ubertooth
6 Ubertooth Designed by Michael Ossmann 2.4GHz experimentation platform Bluetooth 1.x, Low energy, FHSS Hardware CC2400 (+CC2591 frontend) NXP LPC1756 USB device (2.0) Open source software and hardware
7 Spot the difference?
8 Bluetooth Bluetooth is a registered trademark of Bluetooth SIG, Inc
9 Bluetooth 2.4GHz ISM band Variable data rates Basic Rate 1Mb/s Enhanced Data Rate 3Mb/s High Speed - Alternate MAC/PHY 24Mb/s LE (Smart) 200Kb/s 1600Hz 79 channels
10 Bluetooth Bluetooth SIG 17,000 members Free to join Bluetooth devices 7 billion devices sold to end 2011 Will ship 2 billion devices this year 20 billion expected in use by
11 Bluetooth - Terminology Bluetooth device address / MAC / BD_ADDR Three parts, not all present in packets LAP - Lower lowest 24 bits UAP - Upper next 8 bits NAP - Non-significant top 16 bits CLKN 27bit 3200Hz internal clock Increments twice per time slot
12 Bluetooth - Terminology Access code Derived from LAP Packet Header Error check based on UAP Payload Possibly encrypted CRC also based on UAP
13 Bluetooth - Terminology Non-Discoverable mode Does not respond to inquiry scans Still responds to page scans Some newer devices ignore unknown page scans Data whitening Packets XOR'd with pseudo-random sequence
14 Bluetooth sniffing is hard No monitor mode Fixed correlator not promiscuous Frequency hopping 1600 hops/s 625us/packet Pattern based on MAC and CLKN Data whitening PRNG initialised with CLK1-6
15 Bluetooth sniffing is profitable (apparently) Known connection LE only - $250 Known connection BR only - $10,000 All channel BR/EDR/LE - $25,000
16 Finding Packets Old method Find access code Treat 64bit chunks as possible access codes LAP stored in bits Check access code Check trailer (2 errors) Generate access code from LAP Compare access code to 64bit chunk (6 errors)
17 Packets!
18 Flaws Slow on desktop CPU Unworkable on low power devices No errors allowed in LAP No error correction
19 Error Correction
20 Error Correction (64, 30) expurgated block code Based on BCH (63, 30) code Calculate syndromes to find error vectors Supposed to correct up to 6 bit errors Too many false positive results In practice correct <4 bit errors
21 Error Correction Manufacturers don't implement it Known access code loaded into correlator Compared to received bits Up to 6 bit errors This is what we do for a known address
22 Finding Packets New Method Pre-calculate syndromes for n-bit errors Use known access code XOR with all possible n-bit error vectors Generate syndrome for each error Store in hash (uthash rules!) For each 64bit block Calculate syndrome Check hash for error vector Correct error
23 Finding Packets New Method Demo
24 Ubertooth-scan Finding non-discoverable devices Wright's Law Security will not get better until tools for practical exploration of the attack surface are made available.
25 Frequency Hopping
26 Frequency Hopping Local Device Ubertooth-follow Follow a local Bluetooth device Use bluez to extract CLKN Push to Ubertooth Start hopping Demo
27 Frequency Hopping Local Device Pros Reliable Potentially sniff pairing Cons Requires local BT device No AFH support Expected soon Clock drift causes problems This is fixable
28 Frequency Hopping Any Device Derive CLKN from received packets Calculate hopping pattern for known address Sniff single channel or hop randomly Observe packets, timing and channel Place packets in hopping pattern Yields unique CLKN Calculate clock offset from CLKN Ubertooth Send to Ubertooth Follow hopping piconet
29 Frequency Hopping Any Device Ubertooth-hop Follow a remote piconet Given LAP and UAP Finds clock offset and hops Demo
30 Kismet Plugin Plugin for current and upcoming Kismet Only survey mode static or sweep Demo
31 Wireshark Plugin Demo
32 Bluetooth Smart AKA Bluetooth Low Energy Bluetooth 4.0 Wibree Much simpler protocol Mike Ryan has just started working on this Sniffing connection phase Sniffing some data AES Encryption possible flaws in key exchange
33 Future Work Adaptive Frequency Hopping Encryption / Pairing Transmit packet injection Full LE stack Follow in Kismet Storage Embedded platforms
34 Thanks to... Michael Ossmann Jared Boone Mike Kershaw (dragorn) Will Code Mike Ryan Zero Chaos
35 Questions? Twitter: dominicgs Slides: dominicspill.com/ruxcon/slides.pdf
Bluetooth Smart, But Not Smart Enough
Mike Ryan isec Partners isec Open Forum Jan 31, 2012 Slides and More Info http://lacklustre.net/bluetooth/ Overview Three parts what is LE how do we sniff it demo! security analysis 3 What is Bluetooth
Bluetooth Jamming. Bachelor s Thesis. Steven Köppel. [email protected]
Distributed Computing Bluetooth Jamming Bachelor s Thesis Steven Köppel [email protected] Distributed Computing Group Computer Engineering and Networks Laboratory ETH Zürich Supervisors: Michael
Bluetooth: With Low Energy comes Low Security
Bluetooth: With Low Energy comes Low Security Mike Ryan isec Partners Abstract We discuss our tools and techniques to monitor and inject packets in Bluetooth Low Energy. Also known as BTLE or Bluetooth
Quick Start Guide v1.0. This Quick Start Guide is relevant to Laird s BT800, BT810 and BT820 Bluetooth modules.
v1.0 This is relevant to Laird s BT800, BT810 and BT820 Bluetooth modules. INTRODUCTION The Linux operating system, and Android by extension, has excellent USB support for a variety of devices. This makes
Kryptoanalyse og anngrep på Bluetooth
Kryptoanalyse og anngrep på Bluetooth Marius Amund Haugen Master i kommunikasjonsteknologi Innlevert: Desember 2012 Hovedveileder: Stig Frode Mjølsnes, ITEM Norges teknisk-naturvitenskapelige universitet
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
PM0237 Programming manual
Programming manual BlueNRG, BlueNRG-MS stacks programming guidelines Introduction Note: The main purpose of this document is to provide a developer with some reference programming guidelines about how
WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA
Wireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
What s on the Wire? Physical Layer Tapping with Project Daisho
What s on the Wire? Physical Layer Tapping with Project Daisho Dominic Spill, Michael Kershaw, Michael Ossmann Black Hat USA 2013 Abstract Daisho is a project to produce an extensible, open source monitor
Tecnologías Inalámbricas.
Tecnologías Inalámbricas. Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring
Logitech Advanced 2.4 GHz Technology With Unifying Technology
Logitech Advanced 2.4 GHz Technology Revision 070709 July 7, 2009 TABLE OF CONTENTS 1 INTRODUCTION: THE MOVE TO WIRELESS PERIPHERALS IN BUSINESS...3 2 SYSTEM OVERVIEW...4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN
802.11b and associated network security risks for the home user
802.11b and associated network security risks for the home user by Michael Osten [email protected] Background ================= Approved in 1997 by the IEEE 802 committee, 802.11 details the framework
Wireless LAN Pen-Testing. Part I
Wireless LAN Pen-Testing Part I To know your Enemy, you must become your Enemy (Sun Tzu, 600 BC) Georg Penn 23.03.2012 Motivation Read manuals, documentation, standards Check sources for their reliability,
Logitech Advanced 2.4 GHz Technology
Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION...
Recent technological innovations and declining prices for personal computers (PCs) and
Chapter 2 Bluetooth Transmission Technology 2.1 Introduction Recent technological innovations and declining prices for personal computers (PCs) and wireless phones are resulting in an emerging trend coined
AUDIENCE MEASUREMENT SYSTEM BASED ON BLUETOOTH CORDLESS COMMUNICATION
21 22 September 2007, BULGARIA 113 Proceedings of the International Conference on Information Technologies (InfoTech-2007) 21 st 22 nd September 2007, Bulgaria vol. 2 AUDIENCE MEASUREMENT SYSTEM BASED
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
Frequency Hopping Spread Spectrum PHY of the 802.11 Wireless LAN Standard. Why Frequency Hopping?
Frequency Hopping Spread Spectrum PHY of the 802.11 Wireless LAN Standard Presentation to IEEE 802 March 11, 1996 Naftali Chayat BreezeCom 1 Why Frequency Hopping? Frequency Hopping is one of the variants
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Wireless Tools. Training materials for wireless trainers
Wireless Tools Training materials for wireless trainers This talk covers tools that will show you a great deal of information about wireless networks, including network discovery, data logging, security
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Rudi Latuske, ARS Software GmbH 1. Bluetooth in Medical Applications Bluetooth, as a short range wireless technology, is very
Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.
Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2
Bluetooth Wireless Technology
Bluetooth Wireless Technology Jamel Lynch Sr.Consultant/ Architect, IBM [email protected] 919 543 6421 Agenda Bluetooth Overview What is Bluetooth? What isn t Bluetooth? Bluetooth Air Interface Bluetooth
BlackHat Europe. March 3rd 2006, Amsterdam, The Netherlands. by Adam Laurie, Marcel Holtmann and Martin Herfurt
Bluetooth Hacking The State of the Art BlackHat Europe March 3rd 2006, Amsterdam, The Netherlands by Adam Laurie, Marcel Holtmann and Martin Herfurt Agenda Quick technology overview Security mechanisms
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Introducing the Adafruit Bluefruit LE Sniffer
Introducing the Adafruit Bluefruit LE Sniffer Created by Kevin Townsend Last updated on 2015-06-25 08:40:07 AM EDT Guide Contents Guide Contents Introduction FTDI Driver Requirements Using the Sniffer
Keeping SCADA Networks Open and Secure DNP3 Security
Keeping SCADA Networks Open and Secure DNP3 Security June 2008 DNP3 Protocol DNP3 protocol has become widely accepted within water and electrical utilities worldwide for SCADA communications with field
ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna
ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication
DRAFT. Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode
Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode Abstract Due to the serious security issues found in early Bluetooth revisions, Bluetooth revision 2.1 (and later) uses
Bluetooth for device discovery. Networking Guide
Bluetooth for device discovery Networking Guide Index Document Version: v4.4-11/2014 Libelium Comunicaciones Distribuidas S.L. INDEX 1. Introduction... 3 1.1. General description...3 2. Hardware... 5 2.1.
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Computer and Network Security. Alberto Marchetti Spaccamela
Computer and Network Security Alberto Marchetti Spaccamela Slides are strongly based on material by Amos Fiat Good crypto courses on the Web with interesting material on web site of: Ron Rivest, MIT Dan
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
Wi-Fi and Bluetooth - Interference Issues
Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,
Zebra. Quick Start Guide. Wireless Configuration for 802.11n and Bluetooth Radios for. Link-OS Mobile Printers. P1048352-001 Rev.
Zebra Wireless Configuration for 802.11n and Bluetooth Radios for Link-OS Mobile Printers Quick Start Guide Table of Contents Proprietary Statement...2 Introduction...3 Applicable Printers...3 Utilities
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
AirStation One-Touch Secure System (AOSS ) A Description of WLAN Security Challenges and Potential Solutions
AirStation One-Touch Secure System (AOSS ) A Description of WLAN Security Challenges and Potential Solutions Buffalo Technology (USA), Inc. October 2004 1 Summary The Wireless Security Problem With the
Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks
Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks Diego Bohman, Matthias Frank, Peter Martini, Christoph Scholz Institute of Computer Science IV, University of Bonn, Römerstraße
Bluetooth wireless technology basics
Bluetooth wireless technology basics Abstract... 2 Introduction... 2 How Bluetooth wireless technology works... 3 BWT network topologies... 4 BWT security... 5 Establishing BWT connections... 6 Activating
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
TDM & FDM Overlays on Bluetooth
TDM & FDM Overlays on Bluetooth Abdelshakour Abuzneid, Sarosh Patel Viqar U.Mohammed, Varun Kumar Godula Department of Computer Science & Engineering University of Bridgeport {abuzneid, saroshp,vmohamme,vgodula}@bridgeport.edu
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
Bluetooth Security Protocol Analysis and Improvements
Bluetooth Security Protocol Analysis and Improvements A Writing Project Presented to The Faculty of the Department of Computer Science San Jose State University In Partial Fulfillment of the Requirements
Ebook Review - Bluetooth Network Security
BLUETOOTH SECURITY THREATS AND SOLUTIONS: A SURVEY Nateq Be-Nazir Ibn Minar 1 and Mohammed Tarique 2 1 Department of Electrical and Electronic Engineering, American International University, Bangladesh
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description
APPLICATION NOTE AVR2130: Lightweight Mesh Developer Guide Atmel MCU Wireless Features Atmel Lightweight Mesh stack specification and APIs Lightweight Mesh Software Development Kit (SDK) Description This
Wireless Technology and RF Standard in Medical Device Development
Wireless Technology and RF Standard in Medical Device Development 10:10 am 10:50 am Thursday, June 6 Greg Crouch Life Science Business Director, National Instruments Wireless Telehealth Example Telehealth
BLUETOOTH SERIAL PORT PROFILE. iwrap APPLICATION NOTE
BLUETOOTH SERIAL PORT PROFILE iwrap APPLICATION NOTE Thursday, 19 April 2012 Version 1.2 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes no responsibility for
The influence of Wi-Fi on the operation of Bluetooth based wireless sensor networks in the Internet of Things
Faculty of Electrical Engineering, Mathematics & Computer Science The influence of Wi-Fi on the operation of Bluetooth based wireless sensor networks in the Internet of Things Jermain C. Horsman B.Sc.
WiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Microchip Technology. February 2008 Valerio Moretto Slide 1
Microchip Technology February 2008 Valerio Moretto Slide 1 Connectivity Solutions Wired Wireless February 2008 Valerio Moretto Slide 2 Microchip Solutions More complex software Operating Systems >40 MIPS
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Microsoft Message Analyzer Packet Analysis at a Higher Level. Neil B Martin Test Manager WSSC- Interop and Tools Microsoft Corporation
Microsoft Message Analyzer Packet Analysis at a Higher Level Neil B Martin Test Manager WSSC- Interop and Tools Microsoft Corporation Content Packet Analyzer - review Abstracting views of protocols Alternative
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania [email protected] Abstract: The paper has four sections.
Easy H.264 video streaming with Freescale's i.mx27 and Linux
Libre Software Meeting 2009 Easy H.264 video streaming with Freescale's i.mx27 and Linux July 8th 2009 LSM, Nantes: Easy H.264 video streaming with i.mx27 and Linux 1 Presentation plan 1) i.mx27 & H.264
BLUETOOTH SMART CABLE REPLACEMENT
BLUETOOTH SMART CABLE REPLACEMENT APPLICATION NOTE Monday, 15 October 2012 Version 1.5 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes no responsibility for
AN1066. MiWi Wireless Networking Protocol Stack CONSIDERATIONS INTRODUCTION TERMINOLOGY FEATURES
MiWi Wireless Networking Protocol Stack Author: INTRODUCTION Implementing applications with wireless networking is becoming commonplace. From consumer devices to industrial applications, there is a growing
Evaluating GSM A5/1 security on hopping channels
Evaluating GSM A5/1 security on hopping channels Bogdan Diaconescu v1.0 This paper is a practical approach on evaluating A5/1 stream cipher on a GSM hopping network air interface called Um. The end goal
Device and Service Discovery in Bluetooth Networks
Master Thesis MEE 01-28 Device and Service Discovery in Bluetooth Networks & This thesis is presented as a part of the Master of Science degree in Electrical Engineering with emphasis on Telecommunication
Electromagnetic Spectrum (3kHz 300GHz)
Wireless Communication Serial communication Allocated a frequency of operation Could be a range of frequencies Regulated by FCC (Federal Communications Commission) in US Unfortunately, allocations are
CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM
CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM Instructor: Alex C. Snoeren Name SOLUTIONS Student ID Question Score Points 1 15 15 2 35 35 3 25 25 4 15 15 5 10 10 Total 100 100 This exam is
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,
AUTOMOTIVE BLUETOOTH TELEPHONY.
Timo Müller, Mikel Astiz AUTOMOTIVE BLUETOOTH TELEPHONY. COMBINING BlueZ AND THE MODERN VEHICLE. AUTOMOTIVE BLUETOOTH TELEPHONY. WHY ARE WE DOING THIS? Building Open Source IVI Stack for Bluetooth Use
On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments
On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments Suman Jana, Sriram Nandha Premnath Mike Clark, Sneha K. Kasera, Neal Patwari University of Utah Srikanth
What's on the Wire? Physical Layer Tapping with Daisho. Dominic Spill Mike Kershaw / Dragorn Michael Ossmann
What's on the Wire? Physical Layer Tapping with Daisho Dominic Spill Mike Kershaw / Dragorn Michael Ossmann Black Hat USA 2013 Who we are Michael Ossmann Primary on Daisho CFT Creator of multiple OSHW
Einführung in SSL mit Wireshark
Einführung in SSL mit Wireshark Chemnitzer Linux-Tage 16. März 2014 Martin Kaiser What? SSL/TLS is the most widely used security protocol on the Internet there's lots of parameters, options, extensions
Elements of Applied Cryptography. Key Distribution. Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack
Elements of Applied Cryptography Key Distribution Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack Point-to-point key establishment Alice Bob Each pair of users must share
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
Bluetooth Low Energy
Bluetooth Low Energy This page intentionally left blank Bluetooth Low Energy The Developer s Handbook Robin Heydon Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication
WLAN Security WEP Overview 1/2 WEP, Wired Equivalent Privacy Introduced in 1999 to provide confidentiality, authentication and integrity Includes weak authentication Shared key Open key (the client will
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
PCI Express Overview. And, by the way, they need to do it in less time.
PCI Express Overview Introduction This paper is intended to introduce design engineers, system architects and business managers to the PCI Express protocol and how this interconnect technology fits into
Keep it Simple Timing
Keep it Simple Timing Support... 1 Introduction... 2 Turn On and Go... 3 Start Clock for Orienteering... 3 Pre Start Clock for Orienteering... 3 Real Time / Finish Clock... 3 Timer Clock... 4 Configuring
UG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY
EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY This document introduces some basic security concepts, including network layer security, trust centers, and application support layer security features.
EKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
CSCI 491-01 Topics: Internet Programming Fall 2008
CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our
Implementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
